Services
Malware Information Sharing Platform
The MISP (Malware Information Sharing Platform & Threat Sharing) is an open source platform designed for threat intelligence sharing and cybersecurity collaboration. MISP provides a structured environment in which security professionals can share information about malware, threats, attack …
Working Groups
The core team organizes working groups in which you are welcome to participate. These working groups are intended to provide an exchange on current topics in the area of information security. Together, we try to find solutions for the implementation of security measures. Currently two working groups …
Vulnerability Scans
Vulnerability management should be used to regularly check IT infrastructures for security gaps and misconfigurations. Vulnerability scanners can identify attack vectors from both an “inside” and “outside” perspective and help close them. The scans are based on daily updated …
Emergency Communication
In times of crisis, reliable and secure communication is essential, even across locations. The steering committee therefore procured licenses for the Threema Work Messenger. The aim is to enable a secure exchange of information even in crises in which other communication channels are no longer …
Trainings
Regular training courses organized by the core team are offered via the university service center in Reutlingen. The available training programms are BSI IT-Grundschutz Praktiker and BSI IT-Grundschutz Berater. The training is only available in German. If you are interested in participating, please …
Incident Response
In order to be better able to act in acute crisis situations, a partner was identified in the form of Leitwerk to support universities and colleges in handling security incidents. The information security steering committee and the core team have thus established a central service that can be called …
Penetration-Testing
A framework agreement was concluded for the performance of penetration tests to identify and eliminate vulnerabilities in the infrastructure of universities and colleges. This framework agreement allows services to be utilised without further tenders. The targeted testing of critical systems is …
Information Security Management System
The administrative regulation on information security prescribes the introduction of an information security management system (ISMS), based on standards 200-1 to 200-3 of the German Federal Office for Information Security (BSI). An ISMS specifies the regulations and methods used to initiate, …