Competence Center for IT Security
Competence Center for IT Security
Applied security research for our industry
With the Competence Center for IT Security (KIS), the FZI has created a central point of contact for applied IT security research with the support of the state of Baden-Württemberg. The center offers problem-solving expertise in questions of IT security for small and medium-sized enterprises in Baden-Württemberg. At the Competence Center for IT Security, research is conducted on security technologies that are easy to understand and apply.

Contact
PD Dr.-Ing.
Ingmar Baumgart
Division Manager
- +49 721 9654-355
- baumgart@fzi.de
- Headquarters Karlsruhe
New challenges posed by digitalization and the Internet of Things
Ever-advancing digitalization across all industries is making it necessary for IT systems to be increasingly networked. Systems that previously operated in complete isolation are now being connected to the Internet. This leads to a greatly increased attack surface and can enable worldwide attackers to gain access. Particularly worth protecting in this context are critical infrastructures such as power plants or hospitals – attacks on such systems can have serious consequences for the safety of people and the environment.
Likewise, the Internet of Things brings with it new security challenges. To meet these challenges, pure expertise in IT security methods and mechanisms is not enough. The key to success lies in supplementing this knowledge with in-depth expertise of the respective application domain.
A holistic approach to secure IoT systems
- Hardware security
- Cryptography
- Secure software development
- Network security
- IT security management
- Legal aspects (e.g., data protection, liability, …)
- Terminology
- Domain-specific protocols and mechanisms (e.g. OPC-UA, CAN, ETSI ITS G5)
- Domain-specific requirements (e.g., availability, real-time capability)
- Established development processes (e.g., V-model, SDL, …)

Our offer
- Threat analysis
- Best practices and methods of IT security
- Technology assessment
- Research on novel and applicable security solutions
- Identification of legal barriers
- Implementation of legal requirements for innovation technology
- Pentesting
- Awareness and training