We find it difficult to accept that threats often come from within our company. According to a Bitkom study, around 27% of IT attacks on German companies were deliberately carried out by (former) employees in 2024. Despite this, many companies are still focussing on the network perimeter.
However, working from home, multi-cloud setups, the use of SaaS and third-party APIs have removed the traditional boundaries. The network perimeter is no longer a reliable security boundary and we need new strategies.
In this 30-minute, free webinar, we will show you practical data-centric security to protect your company and your workplaces from the inside in the long term.
What you learn in 30 minutes
✅ How the threat landscape has changed
✅ Typical insider and suplier chain threats
✅ How trust relationships are abused
✅ What happens when perimeter security can no longer be guaranteed
✅ Quick fix concrete steps for more security against insider threats
✅ Cost comparison: business interruption vs. data leakage
✅ Live Q&A at the end: your questions, our answers
Who is the webinar suitable for?
The webinar is aimed at:
- IT managers and IT security officers
- Data protection officers
- CISO / Security Officers and decision-makers who want to strategically reduce cyber risks
Date & participation
📅 Date and time: Thu 27.11.2025 16:00-16:30 CET
📍 Free online webinar
🪑 Seats: Limited to 12 - registration required
🇩🇪 It will be held in German
👉 Even if you cannot attend, register and you will get access to the recording of the webinar.
Note: A confirmation email with the link to the webinar will be sent after registration. Please also check your spam folder.
Why you should participate
Firewall, VPN and endpoint security are important - but without visibility and control at the data level, you remain vulnerable. In 30 minutes, we’ll show you how to take concrete measures to minimise not only the risk of insider threats, but also of costly data leaks.
FAQ
Is this webinar free of charge ?
Yes. The webinar is free; registration is required and we will ask for your contact details to send the recording and follow-up information.
Do I need any prior technical knowledge?
Basic knowledge of IT/security is helpful, but the content is explained in a practical and understandable way.
Will I receive documentation?
Yes, registered participants will receive the recording and presentation of the webinar afterwards.
In co-operation with

Big Data, Data Analytics, System Integration and Data Processing
