on 2023-08-28

Knowledge exchange with the State Criminal Police Office of North Rhine-Westphalia in Düsseldorf

Back in March this year, an initial knowledge exchange took place between the teams from Airbus Protect and the State Criminal Police Office of North Rhine-Westphalia (LKA NRW), with both being members of the German Federal Association for Information Technology and Telecommunications, Bitkom. At that time, the LKA NRW visited Airbus Protect at the Taufkirchen site near Munich.
Recently delegates for Airbus Protect visited the LKA NRW in Düsseldorf, following LKA NRW’s initial visit to Airbus Protect. 
This gave the Incident Responders and SOC Analysts of both teams the opportunity to network once again and exchange ideas about possible collaborations. For Airbus Protect, SOC Analysts Simon Witzgall and Thomas Murschall, as well as Markus Neumaier and Philipp Barthel from the Incident Response Team, were on site.

This time, the central topic was the approaches of the LKA NRW in unmasking hackers.
During a presentation, the Airbus Protect Team gained important insights into the working methods of the authorities, in particular information required for a successful prosecution. Since our Incident Response Team provides the customer with a corresponding report after each incident, which also includes a section with information relevant for law enforcement, these insights were particularly informative for our team.
There was also a focus on the work of the LKA NRW on [...]

Knowledge exchange with the State Criminal Police Office of North Rhine-Westphalia in Düsseldorf
  • Share

Discover all the latest releases


Airbus Protect explains: the job of a project manager

Do you want to know what the life of a Project Manager at Airbus Protect looks like? Let’s meet Audrey. How did you end up working at  Airbus Protect? In 2018, wanting to move to the Toulouse region, I was searching for a company offering positions as a design engineer in operational safety. Following several [...]

Read more
CSIRT explained by Airbus Protect Cybersecurity

Digital Forensics & Incident Response: why does help sometimes arrive too late?

Why is time management so important in Digital Forensics & Incident Response?  Digital Forensics and Incident Response (DFIR) is a very specific domain of cybersecurity where time is the enemy. Each minute or hour lost during the crisis could imply either incident escalation or lead to lose another set of logs due to bad retention […]

Read more

Airbus Protect explains: Drones and Autonomous Vehicles

Want to know everything about Drones and Autonomous? Let’s meet Ha-Meem Hussain. Transport system are revolutionized by new technologies, and we stand on the edge of the change. Ha-Meem Hussain joined Airbus Protect 5 years ago after an apprenticeship at Airbus Helicopters. She has worked since on projects of Urban Air Mobility and, surveillance Drones. […]

Read more
Everything you need to know about NIS 2 Directive Cybersecurity

The NIS 2 Directive – your questions answered

Charlotte Graire, Senior Manager of Business Growth, answers the 5 Ws around the EU’s incoming NIS 2 Directive. A new European cyber security regulation is arriving soon. The second iteration of the Directive on Security of Network and Information Systems (NIS 2) is designed to strengthen Member States’ cyber security capabilities and reduce fragmentation at […]

Read more
Digital twins with light blue background Innovation

Digital Twins in companies

Contribute to the assessment of the environmental performance of companies using digital twins for simulation and decision making. What are the challenges of adopting the taxonomy of sustainable activities at EU level? Taxonomy at EU level On April 21, 2021, the European Commission adopted a set of measures aimed at better directing capital flows towards […]

Read more
Honeypot & deceptive security Cybersecurity

Deceptive security: how to catch more flies with honeypots

From governments to industrial manufacturers, organisations across all sectors are experiencing an unprecedented level of cyber-attacks, intrusion attempts and malware. To stay one step ahead, it’s crucial for cyber security leaders to gain a deep understanding of attackers’ tactics, equipment and methods, without compromising the confidentiality, integrity and availability of their organisation’s systems. Increasingly, honeypots […]

Read more