Information Security

Informed, self-determined, and secure in the digital world.

Protection of data and systems in the digital age

In a world that is increasingly permeated by digital technologies, the protection of sensitive data is of paramount importance. In this regard, guaranteeing classic protection goals (confidentiality, integrity, and availability) is just as essential as the legally compliant and user-friendly implementation of data protection and the reconciliation of security measures with business goals. Due to the resulting complexity, challenges frequently arise in the development, implementation, and review of security and data protection concepts, such as:

  • Incomplete knowledge of laws, standards, and individual protection requirements
  • Tensions between information security and feasibility
  • Lack of trust in digital business models
  • Exposure of sensitive data in networked systems, e.g., when migrating to the Cloud
  • Insecurity when implementing the rights of data subjects (e.g., information, correction, and deletion) and the obligations as a controller (e.g., data protection impact assessments, privacy by design, and privacy by default) in accordance with the GDPR
  • High effort for carrying out and verifying security and compliance checks (e.g., penetration tests, IT security assessments)

Our contribution to your information security

We develop and offer methods and tools to ensure secure data exchange and trading that meet the individual protection requirements of data providers and data users. In doing so, we address both information security and data protection with their associated qualities of trust, acceptance, transparency, self-determination, user-friendliness, robustness, and compliance.

Technology: MY DATA Control Technologies, Fraunhofer IESE
© iStock.com

Cloud security: training sessions in our learning lab

 

We offer training and further education in the field of secure cloud computing, with a focus on common standards, best practices, pen testing, and usable security.

Our References

 

Pen testing and review (MBCC/SIKA)

 

Our department supports the MBCC Group in implementing a holistic IT security strategy.

 

Data Intelligence Hub (Deutsche Telekom)

 

Deutsche Telekom uses our MYDATA solution to control data usage in the Data Intelligence Hub (DIH).

 

Security Operations Center (Fraunhofer)

 

Our department is part of the Fraunhofer-Gesellschaft’s Security Operations Center.

 

KickStartTrustee (BMBF)

 

We are doing research on solutions for trustworthy data exchange between data providers and data users.

 

TrUSD / D’accord (BMBF)

 

We are researching user-friendly and legally compliant solutions for how consumers can exercise their data subject rights using data protection cockpits.

Safety-Security-Co-Engineering

Kompetenz: Funktionale Sicherheit (Safety), Fraunhofer IESE
© iStock.com/scotto72

We advise and train our partners in the implementation of the new ISO/SAE 21434 “Road vehicles – Cyber Security Engineering” standard.

We also provide support in integrating cyber security engineering with safety engineering in accordance with the companion standard ISO 26262 “Road vehicles — Functional safety”, for example on the basis of “System-Theoretic Process Analysis” (STPA).

 

Learn more!

Security and data protection in Artificial Intelligence

KoKI - Artificial Intelligence in Municipalities, Fraunhofer IESE
© iStock.com/everythingpossible

Artificial Intelligence is currently a hot topic. In this context, the security of AI systems against manipulation is essential. In addition, it is particularly important to guarantee issues such as transparency, explainability, etc. in AI systems.  

 

Learn more!