Logo
  • Deals
    • Hardware - Overview
      • Mobile Computing - Overview
      • Notebooks
      • Mobile Workstations
      • Tablets
      • Smartphones & Mobile Phones
      • Wearables
      • Mobile Computing Warranties & Services
      • Mobile Computing Accessories
      • Mobile Computing Spare Parts
      • Communication & Conferencing - Overview
      • Conference Systems
      • VoIP Telephony
      • Headsets
      • Webcams
      • Communication Warranties & Services
      • Communication Accessories
      • IT Infrastructure - Overview
      • Servers
      • Storage
      • Uninterruptible Power Supply
      • Network
      • Security
      • Racks
      • IT Infrastructure Warranties & Services
      • IT Infrastructure Accessories
      • IT Infrastructure Spare Parts
      • Computing - Overview
      • PCs
      • Workstations
      • Thin Clients
      • All-in-One PCs
      • Point of Sale & Point of Information
      • Computing Warranties & Services
      • Computing Accessories
      • Computing Spare Parts
      • Peripherals - Overview
      • Monitors
      • Public Displays
      • TVs
      • Projectors
      • Input Devices
      • Audio, Photo & Video
      • Peripherals Warranties & Services
      • Peripherals Accessories
      • Printers & Scanners - Overview
      • Printers
      • Label Printers
      • Disc Duplicators
      • Scanners
      • Barcode Scanners
      • Mobile Data Collection
      • Consumables
      • Warranties & Services
      • Printer & Scanner Accessories
      • Printer Spare Parts
      • Components - Overview
      • SSDs & HDDs
      • Memory
      • Graphics Cards
      • Drives & Enclosures
      • Interfaces & Controllers
      • Storage Media
      • Power Supplies
      • Processors
      • Component Accessories
      • Connectivity - Overview
      • Network Connectivity
      • PC Connectivity
      • USB Connectivity
      • Power Connectivity
      • Phone Connectivity
      • Device Servers
      • Extenders & Splitters
      • Connectivity Accessories
      • Office Equipment - Overview
      • Organisation & Ergonomics
      • Smart Home
      • Cleaning Products
      • Safety, Security & Protection
      • Office Appliances
      • Mounting Solutions
      • Office Furniture
      • Batteries
      • Office Equipment Accessories
      • Outlet - Overview
      • B-Stock
    • Software - Overview
      • Storage, Backup & Recovery - Overview
      • Client Backup & Recovery
      • Backup, Recovery & Archiving
      • Server Backup & Recovery
      • Security Software - Overview
      • Endpoint Security
      • E-mail Security
      • Security Suites
      • Mobile Security
      • Network Security
      • Cloud Security
      • Gateway Security
      • Management & Training
      • Development Software - Overview
      • Project Management & Collaboration
      • Collaboration Software - Overview
      • Communication
      • Document Management
      • File Sharing
      • Office Applications - Overview
      • Office Software & Add-ons
      • Creative Design & Publishing
      • Infrastructure Software - Overview
      • Operating Systems
      • Monitoring & Reporting
      • Software Deployment & Maintenance
      • Print Management
      • Optimisation
      • Virtualisation - Overview
      • Desktop Virtualisation
      • Infrastructure & Management
    • IT Solutions - Overview
      • Business Applications - Overview
      • Collaboration
      • Enterprise Resource Planning
      • DMS & ECM
      • Template Management System Docunize
      • Artificial Intelligence
      • Cloud solutions - Overview
      • Multi-Cloud
      • Public cloud
      • Clouds-Shop
      • FinOps (Financial Operations)-Service
      • Data & Analytics - Overview
      • Data platform and integration
      • Analytics & AI
      • Data visualisation
      • Data strategy
      • Data Centre - Overview
      • Multi Cloud
      • Modular Data Center Competence
      • Hyper Converged Infrastructure
      • Software-defined Datacenter
      • SAP HANA Infrastructure
      • IoT/AI - Overview
      • Bechtle Control Suite
      • Servinvent | Platform for collating medical devices
      • Modern Workplace - Overview
      • 360° Workplace of the Future
      • Device as a Service
      • Modern meetings
      • Communication and Collaboration
      • Azure Virtual Desktop Solutions
      • Mobile working ▷ Remote & flexible on the road
      • Managed Workplace Services
      • Efficient room management
      • Workplace Security
      • Networking - Overview
      • Data Centre Networking
      • Enterprise Networking
      • Bechtle service bundles for Cisco infrastructure
      • IT Security - Overview
      • Application Security
      • Cloud Security
      • Cyber Security
      • Data Centre Security
      • Data protection and information security
      • Infrastructure & Perimeter Security
      • IAM Identity & Access Management
      • Security awareness training
      • Ransomware
      • Cyber Defence Centre
      • Display solutions - Overview
      • The Reception
      • Wayfinding
      • Employee Communications
    • IT Services - Overview
    • Service Desk
      • Consulting Services - Overview
      • Cloud Consulting
      • Managed Services - Overview
      • Printing Services
      • Azure Operations
      • 360° Managed IT
      • Bechtle Prime Support
    • Onsite Services
    • Professional Services
      • Software Asset Management - Overview
      • SAM as a Service
      • SAM Baseline
      • SAM Solution Advisory
      • SAM Cloud Readiness
      • SAM Consulting
      • SAM Century Platform
      • SAM Inventory2go
      • Workplace Services - Overview
      • Assessment, design and procurement
      • Staging and Rollout Services
      • IMAC/RD Services
      • The Bechtle Break&Fix service.
      • Customised IT Accessories
      • Financial Services - Overview
      • Consultation
      • Structuring
      • Financing
      • E-Procurement - Overview
      • My Bechtle
      • ERP Connection
      • Electronic invoicing
      • Quotes
      • Framework agreements
      • Special conditions
      • Promotion Products - Overview
      • New in
      • USB Sticks
      • Wireless Charging Station
      • Powerbanks
      • ProPro range
      • Lifestyle
      • The Webkey
      • 3D Promotional Products
      • Digital Prints Under Tempered Glass
      • Quick Service
      • Process Flow
    • 360° Managed-IT - Overview
    • 360° Managed IT on Microsoft Azure
    • 360° swiss cube
    • 360° colocation
    • 360° infrastructure
    • 360° firewall
    • 360° network
    • 360° backup control
    • 360° cloud backup
    • 360° monitoring
    • 360° CIRT
    • Career - Overview
      • Bechtle as an employer - Overview
      • Development
      • Benefits
      • Departments - Overview
      • IT
      • Sales
      • Other departments
    • Vocational education
    • Application process
    • Career Contact
    • Jobs
    • About Bechtle - Overview
      • Company - Overview
      • Management
      • Bechtle management in Switzerland
      • Locations
      • Bechtle Group Companies
      • Company Development
      • Vision 2030
      • Certifications
      • Bechtle in Switzerland
      • Investors - Overview
      • Bechtle Share
      • Publications
      • Financial Calendar
      • General Meeting
      • Corporate Governance
      • Investors Contact
      • Retail Investors
      • Software revenue according to IFRS 15
    • Sustainability / CSR
      • Events - Overview
      • Bechtle IT Forum 2025 - Replay
      • Webinar Replay Bechtle
      • Bechtle X-MAS Market. (Only French)
      • Webinar: Discover Cybersecurity with Arctic Wolf (Only German)
    • References
      • Public Sector - Overview
      • Schools and IT
      • OCRE with Bechtle
      • International business with Bechtle - Overview
      • Global IT Alliance
    • Partners
      • Contact - Overview
      • Bechtle direct Rotkreuz
      • Bechtle direct Dübendorf
      • Bechtle direct AG Schweiz Morges
      • Bechtle Schweiz AG
      • Support
      • News - Overview
      • Newsroom
      • Corporate News
      • Newsletter
      • Bechtle Blog CH
      • Podcast. bits & bytes
About Bechtle
News
Bechtle Blog CH
IT-Security
Interview with security expert Maximilian Munker
security_header_1440x480.jpg
IT-Security - Aug 15, 2022

Interview with security expert Maximilian Munker

Consultant Information Security, Bechtle Schweiz AG

by Maximilian Munker

 

 

Sophie Saul: Should security managers be worried at the moment?

Maximilian Munker: This clearly depends on the existing maturity level of the company and how proactively it is already prepared for threats. In the past, only the global players and large companies were attacked, as this is where the returns were greatest. Within the last three years, this has also happened massively in the SME segment. The decisive factor for a good IT security strategy is the combination of technical and organisational protective measures for the company.  

 

So the technical aspects are an important element in protecting against attacks?

Yes, many of the current technologies serve to minimise risk. Technologies such as employee identity protection, data classification, endpoint detection & response or vulnerability management are good ways to minimise the attack surface.

 

But technology alone is not enough, is it?

Correct. These measures must always be accompanied by organisational frameworks. The best technical setup is of little help if there is no framework of responsibilities, regular checks or countermeasures in the company.  

Often, the motto "a lot helps a lot" seems to apply, but at the end of the day, there are no adequate controls or even resources to detect and quickly deal with anomalies. We have various standards, so-called frameworks, such as international security frameworks (ISO 27001, NIST or CIS) or internal Information Security Management Systems (ISMS), which provide cornerstones for the implementation and planning of these multi-layered and complex tasks.  

Subsequently, these management systems must be anchored in the organisation through guidelines and process descriptions so that the company and the employees have a defined framework for action for all eventualities.

 

That sounds like a good basis. So does that leave humans as the biggest security risk?

I can agree with this statement. We are not only talking about the classic end user who falls for credential phishing attacks despite repeated security awareness training, but also about the employees who configure hardware and software. There may be no budget in the company for continuous vulnerability scans to detect or eliminate vulnerabilities or insecure configurations. A good example is also the entry and exit processes of employees. If there is no established process for creating and demitting user identities, employees who leave the company can continue to access systems and data with their credentials, even if their tenure has expired.

Thus, IT security remains a complex interplay of organisation, i.e. processes and guidelines, people who have specific awareness and technologies to identify and minimise risks and to protect themselves.

 

Is there a perfect procedure to cover yourself as well as possible?

Above all, it is important to know one's own maturity level as well as the strengths and weaknesses of the company. Cyber security assessments, for example, can evaluate and assess all relevant disciplines of a framework.  Clients receive a final report in which all these weaknesses are processed and prioritised according to severity. In this way, we also provide our clients with a strategy to quickly close the most critical security gaps.

On the organisational level, various means are available to prepare for critical situations. In principle, you can't go wrong with the standards mentioned above. These pragmatically attempt to transfer urgent topics such as backup & restore, disaster recovery, business continuity management and many other areas into a control structure. Through this, the organisation ends up with a fully functioning system of technical infrastructure, organisational processes and control functions to ensure that all disciplines are handled properly.

 

And once everything is in place, what happens next?

Unfortunately, the current challenges and risks cannot be seen as a project with a final completion date, as the threat situation is constantly changing. Every day, several hundred thousand vulnerabilities and malware are added. Thus, security is more like a modern marathon or decathlon, as all these tasks to protect the company must be integrated into the daily business processes. The existing IT security strategy and the technical components must also be regularly reviewed and adapted in order to achieve maximum security. The use of the frameworks also provides a control framework: This also relies on proactive review of all risk factors.

 

Isn't it frustrating to constantly see and react to new methods of attack?

Sometimes you feel like Don Quixote tilting at windmills (laughs). Certainly, the topic is challenging, but by using basic protection mechanisms such as identity protection, monitoring vulnerabilities and regular patching, many topics are already covered. Nevertheless, one should act on the basis of a framework and regularly control all eventualities through the internal ISMS. With these tools, you have the right equipment to face the current risk landscape appropriately.

 

And now one last question, Max. What can companies do if they want to be well secured and still focus on their core tasks instead of security issues?

One way is to transfer risk to an external service provider or even move critical services to the cloud. In this way, resource bottlenecks and missing competences could simply be supplemented without having to build them up within the company. Finally, there are also some technologies that can significantly relieve the internal IT by proactively taking protective measures and identifying anomalies in advance, such as EDR /XDR, SIEM, SOC.  

 

 

Short CV Maximilian Munker:

After completing his Master's degree in Strategy, Technology and Management at the Danube University Krems, Maximilian gained extensive security experience at renowned consulting companies.  At Bechtle Schweiz AG, he manages projects in the areas of IT security, data protection, Microsoft technologies and the implementation and realisation of international frameworks such as ISO 27001 or CIS. He is particularly interested in the daily changing challenges in different customer situations, as there are a wide variety of requirements in the area of IT security.

 

 

Written by

max-munker_portrait.png
Maximilian Munker
Consultant Information Security

E-Mail: maximilian.munker@bechtle.com

    This post was published on Aug 15, 2022.
    Company
    Bechtle Locations
    Career
    Press
    Investor Relations
    Events
    Payment and Delivery
    Help Centre
    Contact
    Support
    Newsletter

    LinkedIn Bechtle LinkedIn Bechtle Schweiz AG

    LinkedIn Bechtle LinkedIn Bechtle direct AG

    YouTube Bechtle YouTube

    Instagram Bechtle Instagram

    Facebook Bechtle Facebook

    Products are sold exclusively to commercial end customers and the public sector.

    Prices in CHF plus VAT.

    Legal Notice Privacy Policy T&Cs
    Support-ID: 550d29deba
    © 2025 Bechtle AG