Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen
AWARE7 GmbH takes part in the RSA conference in San Francisco!
Security Awareness

AWARE7 GmbH takes part in the RSA conference in San Francisco!

The IT security industry meets in San Francisco for the RSA conference. About 45,000 participants will meet to discuss the topic that is responsible for the ava...

Chris Wojzechowski Chris Wojzechowski Geschäftsführender Gesellschafter
Updated: October 7, 2024 2 min read read
IT-Grundschutz-Praktiker (TÜV) IT Risk Manager (DGI) § 8a BSIG Prüfverfahrenskompetenz Ausbilderprüfung (IHK)

TL;DR

AWARE7 GmbH attended RSA Conference 2020 in San Francisco for the first time, presenting the RiskRex digital risk management platform to roughly 45,000 industry participants. RiskRex identifies both technical and human security vulnerabilities and tracks their remediation. The conference name comes from the RSA cryptosystem, named after its inventors Rivest, Shamir, and Adleman, whose asymmetric encryption method underpins much of today's digital security.

Table of Contents (3 sections)

The IT security industry meets in San Francisco for the RSA conference. About 45,000 participants will meet to discuss the topic that is responsible for the availability, confidentiality and integrity of data. The annual meeting has taken place since 1991 and this year AWARE7 GmbH is participating for the first time!

IT security professionals meet in San Francisco!

We are on site to present our Digital Risk Management platform. RiskRex has been developed from scratch for international use. Companies and other organizations can use this modern tool to identify human and technical vulnerabilities and to track their reduction and in the best case closure. The free registration has been running successfully since the beginning of the year. The Premium Version will be available shortly. With this version, companies will be able to download the extensive data sets.

RiskRex accesses hundreds of sources

Technical vulnerabilities are rarely used by attackers on first contact. Numerous studies say that 90% - 95% of cyber attacks are first directed at a human being. Technical and human vulnerabilities must therefore be thought of and presented together and be reduced or closed in a targeted manner. RiskRex fulfils this task. You can register free of charge and receive your IT security score. Please note that the individually triggered scan can take up to 4 hours. The assessment of your own IT security level is an essential part. A recently published study shows that every second company website is at risk.

Where does the name for the RSA conference come from?

The RSA cryptosystem is the name giver of the conference. The asymmetric method is used for encryption as well as for digital signing. The principle of two keys, one public and one private, has been widely used since the 1990s. The three letters come from the surnames of the inventors: Rivest, Shamir and Adleman. The modest Adleman did not even want to be mentioned at first. That is why the order of the letters is not alphabetical. The principle of the one-way function is the security anchor of today's encryption and a component of numerous computer science courses, lectures and exams.

Next Step

Our certified security experts will advise you on the topics covered in this article — free and without obligation.

Free · 30 minutes · No obligation

Share this article

About the author

About the Author

Chris Wojzechowski
Chris Wojzechowski

Geschäftsführender Gesellschafter

E-Mail

Geschäftsführender Gesellschafter der AWARE7 GmbH mit langjähriger Expertise in Informationssicherheit, Penetrationstesting und IT-Risikomanagement. Absolvent des Masterstudiengangs Internet-Sicherheit an der Westfälischen Hochschule (if(is), Prof. Norbert Pohlmann). Bestseller-Autor im Wiley-VCH Verlag und Lehrbeauftragter der ASW-Akademie. Einschätzungen zu Cybersecurity und digitaler Souveränität erschienen u.a. in Welt am Sonntag, WDR, Deutschlandfunk und Handelsblatt.

10 Publikationen
  • Einsatz von elektronischer Verschlüsselung - Hemmnisse für die Wirtschaft (2018)
  • Kompass IT-Verschlüsselung - Orientierungshilfen für KMU (2018)
  • IT Security Day 2025 - Live Hacking: KI in der Cybersicherheit (2025)
  • Live Hacking - Credential Stuffing: Finanzrisiken jenseits Ransomware (2025)
  • Keynote: Live Hacking Show - Ein Blick in die Welt der Cyberkriminalität (2025)
  • Analyse von Angriffsflächen bei Shared-Hosting-Anbietern (2024)
  • Gänsehaut garantiert: Die schaurigsten Funde aus dem Leben eines Pentesters (2022)
  • IT Security Zertifizierungen - CISSP, T.I.S.P. & Co (Live-Webinar) (2023)
  • Sicherheitsforum Online-Banking - Live Hacking (2021)
  • Nipster im Netz und das Ende der Kreidezeit (2017)
IT-Grundschutz-Praktiker (TÜV) IT Risk Manager (DGI) § 8a BSIG Prüfverfahrenskompetenz Ausbilderprüfung (IHK)
Certified ISO 27001ISO 9001AZAV

Cookielose Analyse via Matomo (selbst gehostet, kein Tracking-Cookie). Datenschutzerklärung