Skip to content
Podcast

ITundTECH Podcast: ISMS and Cybersecurity with Florian Bieselt

SecTepe Editorial
|
|
7 min read

Digital transformation opens up immense opportunities for organizations – from more efficient workflows to entirely new business models. But with these benefits comes considerable responsibility: the security of sensitive data and systems must be ensured. In the latest episode of the #ITundTECH Podcast, Holger Winkler speaks with Florian Bieselt from our team about implementing an Information Security Management System (ISMS) and the relevance of cybersecurity.

This engaging interview provides well-founded insights into the challenges and opportunities that come with an ISMS and shows how organizations can navigate the digital world safely. Florian Bieselt not only reports on theoretical fundamentals but also shares a practical case study that highlights typical stumbling blocks and solution approaches when implementing an ISMS.

The Central Topics of the Interview

1. Understanding the Motivations Behind Cyberattacks

Why do hackers target organizations? Florian Bieselt explains the most common motives behind cyberattacks:

  • Financial interests: Ransom demands through ransomware or the sale of sensitive data on the black market.
  • Ideological reasons: Hacktivists seeking to spread political or social messages.
  • Economic espionage: Competitors stealing valuable trade secrets.

Understanding these motivations helps organizations develop appropriate countermeasures.

2. Worst-Case Scenarios: What Happens When It's Too Late?

What happens when an organization is not adequately protected? Florian describes worst-case scenarios such as data loss, system outages, reputational damage, and substantial financial losses. The podcast makes it clear why preventive security measures are not optional but existential.

3. ISMS: Structure and Methodology

An Information Security Management System (ISMS) is the cornerstone of modern cybersecurity strategies. Florian explains how an ISMS is structured, the methodology behind it, and how organizations can use it to systematically minimize risks. An ISMS not only creates security but also strengthens the trust of customers and partners.

4. Case Study: Challenges During Implementation

Using a current case study, Florian illustrates the typical challenges organizations face when introducing an ISMS:

  • Resistance to changes in workflows.
  • Lack of resources, particularly among small and medium-sized enterprises.
  • Missing internal expertise.

Florian shows how these hurdles can be overcome and why a clear plan is crucial.

5. The Role of the External Information Security Officer

An external information security officer can significantly support organizations in effectively implementing an ISMS. Florian describes the benefits of external expertise, ranging from identifying specific risks to providing guidance throughout the certification process.

6. Maturity Level and Certification of an ISMS

An ISMS should not only be implemented but continuously improved. Florian explains why the maturity level of an ISMS is decisive and how certification – for example, according to ISO 27001 – can strengthen business success.

7. What SecTepe Offers

SecTepe provides organizations with comprehensive support in implementing an ISMS: from risk analysis and the development of security concepts to guidance through the certification process. Florian explains how SecTepe accompanies organizations on their path to cybersecurity with tailored solutions.

Conclusion

The episode makes one thing clear: an ISMS is not an IT accessory but a strategic instrument. Organizations that consider attacker motivations, incident impact, and their own organizational maturity together make better decisions – regardless of size or industry. Worth listening to for anyone who wants to lead security rather than just delegate it.