Hackers are increasingly turning their attention to critical infrastructure as well as organizations that are important to the economy and society – both in direct relation to the war and with a view to countermeasures against sanctions.
In this context, the risk of economic espionage and IP theft is also increasing because Russia is economically cut off and therefore will have to develop its own capabilities.
The overall security issues relating to cyber-attacks have not changed due to the war in Ukraine; however, the context and urgency surrounding them have become more compelling. Companies should therefore evaluate their cyber-risk profile and take the potential threats seriously.
How high is the risk of a cyber-attack?
Am I prepared for a cyber-attack?
How can I protect my company from a cyber-attack?
Incident response readiness
Cyber security strategy, risk & compliance
We will help you in strategically reducing cyber-risks.
Incident response & threat management
Our cyber-defense approach focuses on the prevention of, detection of and responses to security incidents.
Information governance & privacy
Our information governance solution provides you with a sustainable information strategy.
Emerging technologies and digitalization
We will assist you in fulfilling the security requirements for smart networked applications and infrastructures.
Cyber security & managed privacy services
Our managed services provide trustworthy solutions with transparent cost controls.
Cyber security for IPO and M&A
Our Cyber Deals team will assist you with the important issues relating to cyber security.
Highly customized phishing -emails targeting individuals as well as social engineering are often the cause of security incidents and subsequent attacks on IT. In such contexts, the “human factor” is targeted as a weakness.
Systems and their data are being relocated from internal company data centers to cloud services and mobile devices. The outsourcing of functions and IT services is nevertheless resulting in new types of risks.
Germany is home to numerous high-tech systems as well as corporations with global operations and is a key player both within the EU and globally.
The damages here result directly from outages in various systems as well as from the time spent recovering (RTO) using backups and from excessively long intervals between backups (RPO).
A ransomware attack encrypts important data with the objective of blackmailing the target into paying ransom in order to have the data restored. In contrast to this, advanced persistent threats (APT) focus on gathering information.
Dr. Alexander Köppen
Partner, Cyber Security & Privacy Strategy, Risk and Compliance, PwC Germany
Tel: +49 1512 9608-114
Aleksei Resetko
CISA, CISSP, Partner Cyber Security & Privacy, PwC Germany
Tel: +49 1511 1653831
Joachim Mohs
Global Industrial Manufacturing und Automotive Cyber Security & Privacy Leader, Partner, PwC Germany
Tel: +49 40 6378-1838
Partner, Cybersecurity, Data Protection & IP Leader, Global Legal Business Solutions Network, PwC Germany
Tel: +49 171 7614597
Manuel Seiferth
Partner, Cyber Security & Privacy Strategy, Risk and Compliance, PwC Germany
Tel: +49 160 536-3800