












信息安全/Information security
Cyber-Bedrohungen in den Bereichen künstliche Intelligenz, Regierungssektor, Gesundheitswesen usw. Wie lassen sich Cyber-Risiken und Cyber-Angriffe minimieren und die Vertraulichkeit und Zuverlässigkeit der Datenübertragung bei der digitalen Transformation sicherstellen ?