22.10.2024| Bruno Blumenthal | PresentationAI Compliance Essentials: Standards and Emerging Regulations Read article
11.09.2024| Markus Günther | ArticlePost Quantum Cryptography - Do the Locks Used Hold Up? Read article
10.06.2024| Michael Veser | ArticleHow you can Incorporate your Company's own Data into a Generative AI Application Read article
18.03.2024| Bruno Blumenthal | ArticleAgainst the Procured Security Incident - Supply Chain Risk Management Read article
24.10.2023| Markus Günther et al. | PresentationOne size fits all was yesterday - efficient awareness made @SBB Read article
19.06.2023| Michael Veser | ArticleHow a Key Management System Can Help You With FADP Compliance Read article
02.06.2022| Daniel Brunner | ArticleThe Challenges of Online Meetings: How To Make Your Meeting a Success Read article
01.12.2021| André Clerc et al. | ArticleThe Elegance of Let's Encrypt in an Internal PKI Read article
09.11.2021| Christoph Koch | CommentaryCorporate Resilience from Cyber Risk and Corporate Risk Perspective Read article
15.12.2020| Gregor Walter | ArticleThreat Analysis of the EKANS Ransomware - How Honda had to Stop Production Read article
12.10.2020| Thomas Bühler | ArticleCentral Authentication and Authorization Management - An Opportunity for the Future Read article
06.03.2020| Thomas Kessler | Presentation2FA for the authentication of HCP at the EPR and in the cloud Read article
05.03.2020| Thomas Kessler | PresentationDie Verwaltung von GFP im EPD: Sisyphos ruft Herkules Read article
28.08.2019| Thomas Kessler | PresentationThe EPR in the field of tension between self-determination and data analysis Read article
01.03.2019| Thomas Kessler | Article2-factor Authentication: Not Only Important for the EPR! Read article
14.05.2018| Thomas Kessler | ArticleInformational Self-Determination: How do we Deal with the Upcoming Upheaval? Read article
08.03.2018| Thomas Kessler et al. | PresentationEPR connection of the University Hospital Basel - implementation of important use cases Read article
21.11.2017| André Clerc | ArticlePriceless: New Swift Rules for Financial Service Providers Read article
27.06.2017| Stephan Töndury | PresentationSelected aspects of the GDPR and their significance for IT in Switzerland Read article
09.03.2017| Thomas Kessler | PresentationCybersecurity in the EPR - tasks, competencies and responsibilities (AKV) Read article
16.08.2016| Adrian Bachmann | ArticleThe EPR as a Litmus Test for Informational Self-Determination Read article
10.03.2016| Daniel Felix Maurer | PresentationICT security management - the tension between business and technology Read article
25.09.2015| Adrian Bachmann | ArticlePrevention, Detection and Response: Why Pure Prevention Is Not (or No Longer) Enough Read article
23.09.2015| Thomas Kessler et al. | PresentationIAM Vision 2025 - IAM concepts beyond Role Based Access Control Read article
19.09.2013| Adrian Bachmann et al. | PresentationIntroduction of a role-based IAM - A practical report Read article
18.09.2012| Daniel Felix Maurer | PresentationISMS in the IT project approach - aspiration and reality Read article