Logo
  • Deals
    • Matériel - Aperçu
      • Informatique mobile - Aperçu
      • Ordinateurs portables
      • Stations de travail portables
      • Tablettes
      • Smartphones et téléphones portables
      • Informatique vestimentaire
      • Garanties et services - Informatique mobile
      • Accessoires - Informatique mobile
      • Pièces détachées - Informatique mobile
      • Communication et conférence - Aperçu
      • Systèmes de conférence
      • Téléphonie VoIP
      • Micro-casques
      • Webcams
      • Garanties et services - Communication
      • Accessoires - Communication
      • Infrastructure informatique - Aperçu
      • Serveurs
      • Stockage
      • Alimentations sans interruption (ASI)
      • Réseau
      • Sécurité
      • Racks
      • Garanties et services - Infrastructure informatique
      • Accessoires - Infrastructure informatique
      • Pièces détachées - Infrastructure informatique
      • Informatique - Aperçu
      • PC
      • Stations de travail
      • Clients légers
      • PC tout-en-un
      • Points de vente et points d'information
      • Garanties et services - Informatique
      • Accessoires - Informatique
      • Pièces détachées - Informatique
      • Périphériques - Aperçu
      • Écrans
      • Écrans publics
      • Téléviseurs
      • Projecteurs
      • Périphériques d'entrée
      • Audio, photo et vidéo
      • Garanties et services - Périphériques
      • Accessoires - Périphériques
      • Imprimantes et scanners - Aperçu
      • Imprimantes
      • Imprimantes d'étiquettes
      • Stations de duplication
      • Scanners
      • Lecteurs de codes-barres
      • Collecte de données mobiles
      • Consommables
      • Garanties et services
      • Accessoires - Imprimantes et scanners
      • Pièces détachées - Imprimantes
      • Composants - Aperçu
      • SSD et disques durs
      • Supports mémoire
      • Cartes graphiques
      • Lecteurs et boîtiers
      • Interfaces et contrôleurs
      • Supports de stockage
      • Alimentations
      • Processeurs
      • Accessoires - Composants
      • Connectivité - Aperçu
      • Connexion réseau
      • Connexion PC
      • Connexion USB
      • Connexion électrique
      • Connexion téléphone
      • Serveurs de périphériques
      • Extensions et répétiteurs
      • Accessoires - Connectivité
      • Équipement de bureau - Aperçu
      • Poste de travail et ergonomie
      • Smart Home
      • Nettoyage
      • Protection et sécurité
      • Appareils pour bureau
      • Supports
      • Mobilier de bureau
      • Piles et batteries
      • Accessoires - Équipement de bureau
      • Outlet - Aperçu
      • B-Stock
    • Logiciels - Aperçu
      • Stockage, sauvegarde et restauration - Aperçu
      • Solutions de sauvegarde et de restauration clients
      • Sauvegarde, restauration et archivage
      • Solutions de sauvegarde et de restauration pour serveurs
      • Logiciels de sécurité - Aperçu
      • Sécurité des terminaux
      • Sécurité des e-mails
      • Suites de sécurité
      • Sécurité mobile
      • Sécurité des réseaux
      • Sécurité du cloud
      • Sécurité des passerelles
      • Management et formation
      • Logiciels de développement - Aperçu
      • Gestion de projets et collaboration
      • Logiciels de collaboration - Aperçu
      • Communication
      • Gestion de documents
      • Échange de fichiers
      • Applications bureautiques - Aperçu
      • Logiciel Office et modules complémentaires
      • Design créatif et édition
      • Logiciels d’infrastructure - Aperçu
      • Systèmes d’exploitation
      • Surveillance et reporting
      • Déploiement de logiciels et maintenance
      • Gestion des impressions
      • Optimisation
      • Virtualisation - Aperçu
      • Virtualisation de bureau
      • Infrastructure et administration
    • Solutions IT - Aperçu
      • Business Applications - Aperçu
      • Collaboration – et le travail d’équipe fonctionne
      • Enterprise Ressource Planning
      • DMS & ECM
      • Système de gestion de modèles Docunize
      • Artificial Intelligence
      • Cloud Solutions - Aperçu
      • Services Multi Cloud
      • Public cloud
      • Clouds-Shop
      • FinOps (Financial Operations)-Service
      • Data & Analytics - Aperçu
      • Plate-forme et intégration des données
      • Analytics & AI
      • Data visualisation
      • Stratégie & Gouvernance
      • Datacenter - Aperçu
      • Multi-cloud
      • Compétence datacenter modulaire
      • Infrastructure hyperconvergée
      • Software Defined Datacenter
      • Infrastructure SAP HANA
      • IoT/AI - Aperçu
      • Bechtle Control Suite
      • Servinvent
      • Modern Workplace - Aperçu
      • Poste de travail 360° du futur
      • Device as a Service
      • Des réunions modernes
      • Communication et collaboration
      • Solutions Azure Virtual Desktop
      • Mobile working ▷ Remote & flexible on the road
      • Managed Workplace Services
      • Gestion efficace des salles
      • Workplace Security
      • Networking - Aperçu
      • Datacentre Networking
      • Enterprise Networking
      • Bechtle service bundles for Cisco infrastructure
      • Sécurité - Aperçu
      • Application Security
      • Securité du cloud
      • Cyber Security
      • Sécurité des datacenters
      • Data protection and information security
      • Infrastructure & Perimeter Security
      • IAM Identity & Access Management
      • Formation security awareness
      • Ransomware
      • Cyber Defence Centre
      • Solutions d’affichage - Aperçu
      • L'accueil
      • Wayfinding
      • Communication avec les employés
    • Services IT - Aperçu
    • Support & Exploitation
      • Consulting Services - Aperçu
      • Conseils Cloud
      • Managed Services - Aperçu
      • Printing Services
      • Azure Operations
      • 360° Managed IT
      • Bechtle Prime Support
    • Onsite Services
    • Professional Services
      • Software Asset Management - Aperçu
      • SAM as a Service
      • SAM Baseline
      • SAM Solution Advisory
      • SAM Cloud Readiness
      • SAM Consulting
      • SAM Century Platform
      • SAM Inventory2go
      • Workplace Services - Aperçu
      • Evaluation, conception et procurement
      • Services de staging et de déploiement
      • Services IMAC/RD
      • Service Break&Fix
      • Accessoires IT sur mesure
      • Services financiers - Aperçu
      • Conseils ▷ Services financiers | Des services IT de Bechtle
      • Structuration ▷ Services financiers | Services IT Bechtle
      • Financement ▷ Services financiers | Des services IT de Bechtle
      • E-Procurement - Aperçu
      • My Bechtle
      • Connexion ERP
      • Facturation électronique
      • Devis
      • Contrats cadres
      • Conditions spéciales
      • Promotion Products - Aperçu
      • Nouveautés
      • Clés USB
      • Station de chargement sans fil
      • Powerbanks
      • Gamme ProPro
      • Lifestyle
      • La webkey
      • Produits promotionnels 3D
      • Verre trempé avec marquage digital
      • Quickservice
      • Processus
    • 360° Managed-IT - Aperçu
    • 360° Managed IT sur Microsoft Azure
    • 360° swiss cube
    • 360° colocation
    • 360° infrastructure
    • 360° firewall
    • 360° network
    • 360° backup control
    • 360° cloud backup
    • 360° monitoring
    • 360° CIRT
    • Carrière - Aperçu
      • Bechtle as an employer - Aperçu
      • Développement
      • Vos avantages
      • Domaines d'activité - Aperçu
      • IT
      • Ventes
      • Autres domaines
    • Formation professionnelle
    • Processus de recrutement
    • Ressources humaines
    • Jobs
    • À propos de Bechtle - Aperçu
      • Entreprise - Aperçu
      • Management
      • Direction de Bechtle en Suisse
      • Les sites
      • Les entreprises Bechtle
      • La success story de Bechtle
      • Vision 2030
      • Certifications
      • Bechtle en Suisse
      • Relations investisseurs - Aperçu
      • L’action Bechtle
      • Publications
      • Calendrier financier
      • Assemblée générale
      • Gouvernance d’entreprise
      • Investisseurs – Contact
      • Actionnaires privé(e)s
      • Ventes de logiciels selon IFRS 15
    • Durabilité
      • Événements - Aperçu
      • Bechtle IT Forum 2025 - Replay
      • Webinar Replay Bechtle
      • Bechtle X-Mas Market.
      • Webinar: Discover Cybersecurity with Arctic Wolf (Only German)
    • Références
      • Secteur Public - Aperçu
      • Écoles et IT
      • OCRE avec Bechtle
      • International business with Bechtle - Aperçu
      • Bechtle Global IT Alliance
    • Partenaires
      • Contact - Aperçu
      • Bechtle direct Rotkreuz
      • Bechtle direct Dübendorf
      • Bechtle direct AG Schweiz Morges
      • Bechtle Suisse SA
      • Support
      • Actualites - Aperçu
      • Salle d'actualité
      • Actualité du groupe
      • Newsletter
      • Bechtle Blog CH
      • Podcast. bits & bytes
À propos de Bechtle
Actualites
Bechtle Blog CH
IT-Security
Interview with security expert Maximilian Munker
security_header_1440x480.jpg
IT-Security - 15 août 2022

Interview with security expert Maximilian Munker

Consultant Information Security, Bechtle Schweiz AG

de Maximilian Munker

 

Sophie Saul: Should security managers be worried at the moment?

Maximilian Munker: This clearly depends on the existing maturity level of the company and how proactively it is already prepared for threats. In the past, only the global players and large companies were attacked, as this is where the returns were greatest. Within the last three years, this has also happened massively in the SME segment. The decisive factor for a good IT security strategy is the combination of technical and organisational protective measures for the company.  

 

So the technical aspects are an important element in protecting against attacks?

Yes, many of the current technologies serve to minimise risk. Technologies such as employee identity protection, data classification, endpoint detection & response or vulnerability management are good ways to minimise the attack surface.

 

But technology alone is not enough, is it?

Correct. These measures must always be accompanied by organisational frameworks. The best technical setup is of little help if there is no framework of responsibilities, regular checks or countermeasures in the company.  

Often, the motto "a lot helps a lot" seems to apply, but at the end of the day, there are no adequate controls or even resources to detect and quickly deal with anomalies. We have various standards, so-called frameworks, such as international security frameworks (ISO 27001, NIST or CIS) or internal Information Security Management Systems (ISMS), which provide cornerstones for the implementation and planning of these multi-layered and complex tasks.  

Subsequently, these management systems must be anchored in the organisation through guidelines and process descriptions so that the company and the employees have a defined framework for action for all eventualities.

 

That sounds like a good basis. So does that leave humans as the biggest security risk?

I can agree with this statement. We are not only talking about the classic end user who falls for credential phishing attacks despite repeated security awareness training, but also about the employees who configure hardware and software. There may be no budget in the company for continuous vulnerability scans to detect or eliminate vulnerabilities or insecure configurations. A good example is also the entry and exit processes of employees. If there is no established process for creating and demitting user identities, employees who leave the company can continue to access systems and data with their credentials, even if their tenure has expired.

Thus, IT security remains a complex interplay of organisation, i.e. processes and guidelines, people who have specific awareness and technologies to identify and minimise risks and to protect themselves.

 

Is there a perfect procedure to cover yourself as well as possible?

Above all, it is important to know one's own maturity level as well as the strengths and weaknesses of the company. Cyber security assessments, for example, can evaluate and assess all relevant disciplines of a framework.  Clients receive a final report in which all these weaknesses are processed and prioritised according to severity. In this way, we also provide our clients with a strategy to quickly close the most critical security gaps.

On the organisational level, various means are available to prepare for critical situations. In principle, you can't go wrong with the standards mentioned above. These pragmatically attempt to transfer urgent topics such as backup & restore, disaster recovery, business continuity management and many other areas into a control structure. Through this, the organisation ends up with a fully functioning system of technical infrastructure, organisational processes and control functions to ensure that all disciplines are handled properly.

 

And once everything is in place, what happens next?

Unfortunately, the current challenges and risks cannot be seen as a project with a final completion date, as the threat situation is constantly changing. Every day, several hundred thousand vulnerabilities and malware are added. Thus, security is more like a modern marathon or decathlon, as all these tasks to protect the company must be integrated into the daily business processes. The existing IT security strategy and the technical components must also be regularly reviewed and adapted in order to achieve maximum security. The use of the frameworks also provides a control framework: This also relies on proactive review of all risk factors.

 

Isn't it frustrating to constantly see and react to new methods of attack?

Sometimes you feel like Don Quixote tilting at windmills (laughs). Certainly, the topic is challenging, but by using basic protection mechanisms such as identity protection, monitoring vulnerabilities and regular patching, many topics are already covered. Nevertheless, one should act on the basis of a framework and regularly control all eventualities through the internal ISMS. With these tools, you have the right equipment to face the current risk landscape appropriately.

 

And now one last question, Max. What can companies do if they want to be well secured and still focus on their core tasks instead of security issues?

One way is to transfer risk to an external service provider or even move critical services to the cloud. In this way, resource bottlenecks and missing competences could simply be supplemented without having to build them up within the company. Finally, there are also some technologies that can significantly relieve the internal IT by proactively taking protective measures and identifying anomalies in advance, such as EDR /XDR, SIEM, SOC.  

 

 

Short CV Maximilian Munker:

After completing his Master's degree in Strategy, Technology and Management at the Danube University Krems, Maximilian gained extensive security experience at renowned consulting companies.  At Bechtle Schweiz AG, he manages projects in the areas of IT security, data protection, Microsoft technologies and the implementation and realisation of international frameworks such as ISO 27001 or CIS. He is particularly interested in the daily changing challenges in different customer situations, as there are a wide variety of requirements in the area of IT security.

 

Rédigé par

max-munker_portrait.png
Maximilian Munker
Consultant Information Security

E-Mail: maximilian.munker@bechtle.com

    Nous avons publié cet article le 15 août 2022.
    Le groupe
    Sites Bechtle
    Carrière
    Presse
    Relations investisseurs
    Événements
    Conditions de livraison et de paiement
    Centre d'aide
    Contact
    Support
    Newsletter

    LinkedIn Bechtle LinkedIn Bechtle Schweiz AG

    LinkedIn Bechtle LinkedIn Bechtle direct AG

    YouTube Bechtle YouTube

    Instagram Bechtle Instagram

    Facebook Bechtle Facebook

    Notre offre est exclusivement destinée aux clients professionnels et publics.

    Les prix se comprennent en CHF hors TVA en vigueur.

    Mentions légales Déclaration de protection des données CGV
    Support-ID: e5b8797b61
    © 2025 Bechtle AG