The regular IT user relies blindly on the IT landscape and takes it for granted that everything runs smoothly. Unfortunately, this especially applies for the management, where topics like cyber security are rarely ever brought into question.
When it comes to cyber security, we trust in technologies like spam filters, firewalls and endpoint protection or even do user awareness trainings. 3 out of 4 organizations that experience a security breach, have a state-of-the-art security stack. So, what else can we do? First and foremost, we need to review the security measures that we implement. It is one thing to have a great security concept but even the best design is worthless without a qualified validation.