<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Hybrid Threats Archive - NOX SYSTEMS | Security beyond limits</title>
	<atom:link href="https://noxsystems.com/en/tag/hybrid-threats/feed/" rel="self" type="application/rss+xml" />
	<link>https://noxsystems.com/en/tag/hybrid-threats/</link>
	<description></description>
	<lastBuildDate>Mon, 27 Oct 2025 16:27:34 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>There is an Increased Risk of Manipulation, Espionage, and Countermeasures for KRITIS</title>
		<link>https://noxsystems.com/en/increased-risks-for-kritis/</link>
					<comments>https://noxsystems.com/en/increased-risks-for-kritis/#respond</comments>
		
		<dc:creator><![CDATA[Alexandra]]></dc:creator>
		<pubDate>Mon, 27 Oct 2025 13:45:53 +0000</pubDate>
				<category><![CDATA[EMA]]></category>
		<category><![CDATA[Interviews]]></category>
		<category><![CDATA[alarm management]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[Hybrid Threats]]></category>
		<guid isPermaLink="false">https://noxsystems.com/?p=10471</guid>

					<description><![CDATA[<p>In light of the current situation, what is the level of threat that operators of critical infrastructure face, and are other companies affected as well? Torsten Hiermann: "The threat situation has changed in recent months and has increased significantly. At the end of september, chancellor Friedrich Merz summed it up: "We are not at  [...]</p>
<p>Der Beitrag <a href="https://noxsystems.com/en/increased-risks-for-kritis/">There is an Increased Risk of Manipulation, Espionage, and Countermeasures for KRITIS</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:0px;--awb-padding-left:0px;--awb-padding-right-small:0px;--awb-padding-left-small:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1372.8px;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-text fusion-text-1" style="--awb-text-color:#000000;"><p><strong><em>In light of the current situation, what is the level of threat that operators of critical infrastructure face, and are other companies affected as well?</em></strong></p>
<p><strong>Torsten Hiermann:</strong> &#8220;The threat situation has changed in recent months and has increased significantly. At the end of september, chancellor Friedrich Merz summed it up: &#8220;We are not at war, but we are no longer at peace either.&#8221; Malicious manipulation is no longer a marginal phenomenon but rather a strategic method of disrupting economic, political, and social processes. The office for the protection of the constitution and the federal office for civil protection define this approach as deliberately impairing or destroying structures to weaken or influence them. This is not just about &#8220;classic&#8221; attacks on buildings, but also subtle attacks, such as disruptions to supply chains, targeted espionage, manipulation of public perception, and spreading uncertainty to influence political decision-making or encourage anti-state attitudes.</p>
<p>Therefore, the perpetrator landscape is broad. According to police statistics, left-wing extremist groups in particular tend to carry out attacks on infrastructure and provide instructions on how to build incendiary devices online. We also see state actors working through &#8220;proxies,&#8221; or recruited helpers who appear inconspicuous at first but are actually pursuing foreign interests. We must also not underestimate the danger from within. Employees who are frustrated or feel unfairly treated can become saboteurs.</p>
<p>Additionally, we are now dealing with hybrid threats. These attacks are not only physical, such as cutting a cable or attacking a transformer station, but also combine cyberattacks, social engineering, and classic physical attacks. Perpetrators intercept data, manipulate processes, or use social media to obtain information. That&#8217;s why I say the protection of objects doesn&#8217;t end at the fence.</p>
<p><em><strong>You mentioned the importance of information. Could you elaborate on that?</strong></em></p>
<p><strong>Torsten Hiermann:</strong> Many people underestimate how valuable publicly available information is to a potential attacker. Social media profiles often reveal interesting information: For example, LinkedIn profiles often reveal not only where someone works, but also the projects and technologies they are involved in. This information is an excellent recruitment and evaluation tool for external services. The fact that Google Earth can be used to evaluate the initial vulnerabilities of a location is nothing new.</p>
<p>Added to this is careless handling of internal information. For example: In a critical infrastructure facility, tradespeople and service providers are given a detailed site plan with corresponding facility designations as part of their safety training. This provides potential perpetrators with precise information for planning an attack. This illustrates that protection against saboteurs also requires preventive information protection. What data should I publish? How restrictive should I be when naming contact persons? Is there a social media policy? How do I educate employees so they understand they are part of the security chain?</p>
<p><em><strong>Drones have recently come into focus as a security risk. How do you see the role of airspace in the overall concept?</strong></em></p>
<p><strong>Torsten Hiermann:</strong> The threat posed by drones has reached a new dimension. They can film, collect reconnaissance data—for example, on processes or response times—record digital signatures, and transport objects and &#8220;weapons,&#8221; which they can drop. The war in Ukraine has shown how rapidly technology and its applications are advancing.</p>
<p>Nevertheless, I advocate a differentiated approach. Not every company needs to invest in expensive anti-drone systems right away. The key factor is risk analysis. A &#8220;normal&#8221; production facility without drones poses a lower risk than an energy supplier, chemical plant, airport, or military property, for example. In particular, KRITIS operators must now &#8220;take airspace into account&#8221; in their security concepts.</p>
<p>Remember that drones often complete their task before being detected. Therefore, the key questions are: How do we detect drones, and how do we respond to them? Rather, the security concept must be thought out from the perspective of the perpetrator. What information will a drone be able to see and access? How can that be prevented &#8220;on the ground&#8221;?</p>
</div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-0 fusion_builder_column_inner_1_1 1_1 fusion-flex-column" style="--awb-padding-top:24px;--awb-padding-right:24px;--awb-padding-bottom:24px;--awb-padding-left:24px;--awb-overflow:hidden;--awb-bg-color:rgba(22,51,97,0.05);--awb-bg-color-hover:rgba(22,51,97,0.05);--awb-bg-size:cover;--awb-border-color:var(--awb-color8);--awb-border-left:5px;--awb-border-style:solid;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-image-element " style="--awb-aspect-ratio:1 / 1;--awb-object-position:23% 49%;--awb-margin-bottom:24px;--awb-max-width:300px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);"><div style="display:inline-block;width:300px;"><span class=" fusion-imageframe imageframe-none imageframe-1 hover-type-none has-aspect-ratio" style="border-radius:100%;"><img fetchpriority="high" decoding="async" width="300" height="200" title="TH_Porttrait_1" src="https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1-300x200.jpg" class="img-responsive wp-image-8604 img-with-aspect-ratio" alt srcset="https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1-200x133.jpg 200w, https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1-400x267.jpg 400w, https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1-600x400.jpg 600w, https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1-800x534.jpg 800w, https://noxsystems.com/wp-content/uploads/2025/05/TH_Porttrait_1.jpg 1000w" sizes="(max-width: 850px) 100vw, 300px" /></span></div></div><div class="fusion-text fusion-text-2 fusion-text-no-margin" style="--awb-text-color:var(--awb-color8);--awb-margin-top:0px;--awb-margin-bottom:0px;"><p>&#8220;Comprehensive protection is not just about defense; it&#8217;s also about preparation. It requires companies to consider not only the physical perimeter but also information protection, social engineering, IT security, and airspace.&#8221;</p>
<p><strong>Torsten Hiermann</strong><br />
CriseConsult</p>
</div></div></div></div><div class="fusion-text fusion-text-3" style="--awb-text-color:#000000;"><p><em><strong>What specific countermeasures do you recommend in terms of organization and technology?</strong></em></p>
<p><strong>Torsten Hiermann:</strong> It&#8217;s about a holistic approach. First, the organizational side: prohibitions on filming and photography on company premises, employee training, and checking vehicles and people for items they are carrying. Access controls must also be reliable and effective. Depending on the level of protection, this may involve biometric procedures. In short, if I don&#8217;t check at the gate to see if a service provider is bringing in something undesirable, I don&#8217;t need to worry about drones above.</p>
<p>Technically, we have a wide range of options, including perimeter sensors, video surveillance, motion detectors, and tamper-proof devices. Drone detection systems can also be useful. In critical areas, active defense measures, such as jammers or interceptor drones, may be considered. At the same time, however, it&#8217;s important to consider resilience, such as redundant power supplies, emergency generators, and secure supply chains. Business continuity is always part of overall protection!</p>
<p><em><strong>What role does integrated alarm and security management play in this context?</strong></em></p>
<p><strong>Torsten Hiermann:</strong> A crucial one. We can introduce as many individual measures as we like, but if they are not integrated, we will end up with a patchwork again. To create an effective 360-degree security concept, all vectors must be taken into account.</p>
<p><em><strong>Does that mean that, in the future, all companies—not just KRITIS operators—will have to address attacks more intensively?</strong></em></p>
<p><strong>Torsten Hiermann:</strong> It depends on the risk analysis and the level of protection. A medium-sized mechanical engineering company may not face the same threats as a network operator. However, they can still be crippled by physical or IT attacks. Just think of cyberattacks, disrupted supply chains, or power outages. Production at the Tesla Gigafactory was crippled not by a highly complex operation but by a simple arson attack on a supply line. So, the question is, &#8220;How vulnerable am I?&#8221; How resilient are my processes? Have I taken precautions to remain operational in the event of an attack or minimize damage?</p>
<p>This is precisely why business continuity is important. Comprehensive protection is about more than just defense; it&#8217;s also about preparation. It requires companies to consider not only the physical perimeter but also information protection, social engineering, IT security, and airspace.</p>
</div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-1 fusion_builder_column_inner_1_1 1_1 fusion-flex-column" style="--awb-padding-top:24px;--awb-padding-right:24px;--awb-padding-bottom:24px;--awb-padding-left:24px;--awb-overflow:hidden;--awb-bg-color:var(--awb-color2);--awb-bg-color-hover:var(--awb-color2);--awb-bg-size:cover;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-four" style="--awb-margin-top:0px;"><h4 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;--fontSize:20;line-height:1.4;">Interviewpartner</h4></div><div class="accordian fusion-accordian" style="--awb-border-size:0px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color1);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color8);--awb-title-color:var(--awb-color8);--awb-content-color:#000000;--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:#000000;--awb-toggle-active-accent-color:#000000;--awb-title-font-family:&quot;Lato&quot;;--awb-title-font-weight:700;--awb-title-font-style:normal;--awb-title-font-size:16px;--awb-title-line-height:1.2;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);"><div class="panel-group fusion-toggle-icon-right fusion-toggle-icon-unboxed" id="accordion-10471-1"><div class="fusion-panel panel-default panel-dd1174c726c71b95d fusion-toggle-no-divider fusion-toggle-boxed-mode" style="--awb-title-color:var(--awb-color8);"><div class="panel-heading"><div class="panel-title toggle" id="toggle_dd1174c726c71b95d"><a aria-expanded="false" aria-controls="dd1174c726c71b95d" role="button" data-toggle="collapse" data-parent="#accordion-10471-1" data-target="#dd1174c726c71b95d" href="#dd1174c726c71b95d"><span class="fusion-toggle-icon-wrapper" aria-hidden="true"><i class="fa-fusion-box active-icon fa-angle-up fas" aria-hidden="true"></i><i class="fa-fusion-box inactive-icon fa-angle-down fas" aria-hidden="true"></i></span><span class="fusion-toggle-heading">CriseConsult</span></a></div></div><div id="dd1174c726c71b95d" class="panel-collapse collapse " aria-labelledby="toggle_dd1174c726c71b95d"><div class="panel-body toggle-content fusion-clearfix">
<p>Torsten Hiermann is the founder of CrisisConsult, a consulting firm that specializes in crisis and security management. He advises companies, local authorities, and government institutions, drawing on his extensive experience in operational roles within emergency and crisis management teams. Torsten is also a lecturer at the Academy for Crisis Management (AKNZ) and at the University of Münster. He is also an officer in the German Armed Forces. In security management, he takes a holistic, 360-degree approach to ensure that the level of security and the potential threat are proportionate.<br />
www.criseconsult.de</p>
</div></div></div></div></div></div></div></div><div class="fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-1 fusion-content-boxes-1 content-boxes-icon-with-title content-left" style="--awb-hover-accent-color:var(--awb-color4);--awb-circle-hover-accent-color:var(--awb-color4);--awb-item-margin-bottom:40px;" data-animationOffset="top-into-view"><div style="--awb-backgroundcolor:rgba(255,255,255,0);" class="fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row"><div class="col content-box-wrapper content-wrapper link-area-link-icon link-type-text content-icon-wrapper-yes icon-hover-animation-fade" data-animationOffset="top-into-view"><div class="heading icon-left"><a class="heading-link" style="float:left;" href="https://noxsystems.com/en/nox-sys/" target="_self"><h2 class="content-box-heading fusion-responsive-typography-calculated" style="--h2_typography-font-size:24px;--fontSize:24;line-height:1.4;">NOX SYS</h2></a></div><div class="fusion-clearfix"></div><div class="content-container">
<p>Systems like NOX SYS integrate intrusion detection technology, access control, video surveillance, and alarm management onto one platform. This allows events to be recorded and evaluated holistically and targeted measures to be initiated. NOX SYS is EN 50131 Grade 3 certified and suitable for use in KRITIS environments. The modular system can easily be supplemented with new technologies, such as drone detection. Additionally, encrypted communication between components and a high level of tamper protection ensure manipulation is detected and prevented.</p>
</div><div class="fusion-clearfix"></div><a class=" fusion-read-more" style="float:left;" href="https://noxsystems.com/en/nox-sys/" target="_self">Read More</a><div class="fusion-clearfix"></div></div></div><div class="fusion-clearfix"></div></div></div></div></div></div>
<p>Der Beitrag <a href="https://noxsystems.com/en/increased-risks-for-kritis/">There is an Increased Risk of Manipulation, Espionage, and Countermeasures for KRITIS</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://noxsystems.com/en/increased-risks-for-kritis/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Only Those Who Know Their Critical Processes Can Protect Them</title>
		<link>https://noxsystems.com/en/geopolitical-risks-and-corporate-protection/</link>
					<comments>https://noxsystems.com/en/geopolitical-risks-and-corporate-protection/#respond</comments>
		
		<dc:creator><![CDATA[Alexandra]]></dc:creator>
		<pubDate>Thu, 24 Apr 2025 13:24:53 +0000</pubDate>
				<category><![CDATA[Interviews]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[Enterprise Security]]></category>
		<category><![CDATA[Hybrid Threats]]></category>
		<category><![CDATA[Hybride Bedrohungen]]></category>
		<category><![CDATA[Kritische Infrastrukturen]]></category>
		<category><![CDATA[Physische Sicherheit]]></category>
		<category><![CDATA[Security Strategy]]></category>
		<category><![CDATA[Sicherheitsstrategie]]></category>
		<category><![CDATA[Systemintegration]]></category>
		<category><![CDATA[Systems Integration]]></category>
		<category><![CDATA[Unternehmenssicherheit]]></category>
		<guid isPermaLink="false">https://noxsystems.com/?p=8506</guid>

					<description><![CDATA[<p>Geopolitics, hybrid threats and vulnerable supply chains have made corporate security more strategic than ever. In this interview, Björn Hawlitschka of MACONIA GmbH provides insight into current threat scenarios and practical recommendations. Mr Hawlitschka, to what extent are companies more exposed to geopolitical risks today than they were ten years ago? Björn Hawlitschka: I  [...]</p>
<p>Der Beitrag <a href="https://noxsystems.com/en/geopolitical-risks-and-corporate-protection/">Only Those Who Know Their Critical Processes Can Protect Them</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:0px;--awb-padding-left:0px;--awb-padding-right-small:0px;--awb-padding-left-small:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1372.8px;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-text fusion-text-4" style="--awb-text-color:#000000;"><h5>Geopolitics, hybrid threats and vulnerable supply chains have made corporate security more strategic than ever. In this interview, Björn Hawlitschka of MACONIA GmbH provides insight into current threat scenarios and practical recommendations.</h5>
<p><em><strong>Mr Hawlitschka, to what extent are companies more exposed to geopolitical risks today than they were ten years ago?</strong></em></p>
<p><strong>Björn Hawlitschka:</strong> I studied political science and then worked for a long time at the Federal Academy for Security Policy. Even then, we were working with an expanded concept of security in which networking and strategic thinking played a major role. Today we can clearly see that geopolitical risks have become more complex. In the past, companies could afford the luxury of keeping IT and security strictly separate. Conflicts such as the war in Ukraine, the pandemic and supply chain issues have shown us how vulnerable our systems are. It only takes one freighter stuck in the Suez Canal to bring entire production chains to a standstill.</p>
<p><em><strong>Why are critical infrastructures and companies increasingly being targeted by states or non-state actors?</strong></em></p>
<p><strong>Björn Hawlitschka:</strong> On the one hand, we see classic, economically motivated cybercrime &#8211; such as the Darkside attack on the Colonial Pipeline in 2021. On the other hand, politically motivated sabotage is also on the rise. Both are dangerous. It becomes particularly perfidious when attacks take on hybrid forms, combining physical and digital sabotage. The motives range from economic blackmail to the deliberate destabilisation of entire societies.</p>
<p><em><strong>Which sectors are particularly at risk, and which threat scenarios do you see as most critical at the moment?</strong></em></p>
<p><strong>Björn Hawlitschka:</strong>Traditional industries such as energy, chemicals and technology are of course in the spotlight. But small and medium-sized enterprises or municipal institutions are also vulnerable, for example to ransomware. It is particularly critical if social services can no longer be paid out in the event of such attacks. This undermines trust in government and can exacerbate social tensions.</p>
<p><em><strong>Do you see a trend towards targeted hybrid threats, i.e. a combination of physical sabotage and cyberattacks?</strong></em></p>
<p><strong>Björn Hawlitschka: </strong>Absolutely. In Ukraine, we have already seen a combination of cyber attacks and physical sabotage in 2015. This type of threat will increase because it is particularly effective.</p>
<p><em><strong>What basic security measures should companies take to protect themselves against digital threats?</strong></em></p>
<p><strong>Björn Hawlitschka:</strong>A solid risk analysis that maps all business processes is important. This includes a business impact analysis: Which processes are most critical? How long can they be down? And patch management! This sounds banal, but many vulnerabilities arise because available security updates have not been installed. Employee awareness also plays a major role &#8211; after all, people are both the biggest vulnerability and the most important resource.</p>
<p><em><strong>How can physical security measures be effectively integrated with cyber defence strategies?</strong></em></p>
<p><strong>Björn Hawlitschka: </strong>The zero-trust approach is very helpful here &#8211; not only in IT, but also physically: don&#8217;t blindly trust anyone, even if they are in the building. Awareness has to be trained in all areas. Many companies protect the outer ring very well &#8211; but once someone is inside, they can move around freely. That is a risk.</p>
<p><em><strong>Are there any best practices or specific examples from the corporate world that can serve as models for security strategies?</strong></em></p>
<p><strong>Björn Hawlitschka:</strong>Microsoft&#8217;s Zero Trust model is a good example. Or Toyota, which revised its supply chain strategies after Fukushima and is now planning with more redundancy. It is important not just to react, but to learn from crises.</p>
</div><div class="fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-2 fusion_builder_column_inner_1_1 1_1 fusion-flex-column" style="--awb-padding-top:24px;--awb-padding-right:24px;--awb-padding-bottom:24px;--awb-padding-left:24px;--awb-overflow:hidden;--awb-bg-color:rgba(22,51,97,0.05);--awb-bg-color-hover:rgba(22,51,97,0.05);--awb-bg-size:cover;--awb-border-color:var(--awb-color8);--awb-border-left:5px;--awb-border-style:solid;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-image-element " style="--awb-aspect-ratio:1 / 1;--awb-object-position:44% 47%;--awb-margin-bottom:24px;--awb-max-width:250px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);"><div style="display:inline-block;width:250px;"><span class=" fusion-imageframe imageframe-none imageframe-2 hover-type-none has-aspect-ratio" style="border-radius:100%;"><img decoding="async" width="300" height="300" title="portrait_hawlitschka" src="https://noxsystems.com/wp-content/uploads/2025/04/portrait_hawlitschka-300x300.jpeg" class="img-responsive wp-image-8498 img-with-aspect-ratio" alt srcset="https://noxsystems.com/wp-content/uploads/2025/04/portrait_hawlitschka-200x200.jpeg 200w, https://noxsystems.com/wp-content/uploads/2025/04/portrait_hawlitschka.jpeg 400w" sizes="(max-width: 850px) 100vw, 300px" /></span></div></div><div class="fusion-text fusion-text-5 fusion-text-no-margin" style="--awb-text-color:var(--awb-color8);--awb-margin-top:0px;--awb-margin-bottom:0px;"><p><em>&#8220;The first step is to know your own processes. If you don&#8217;t know what your own &#8216;castle&#8217; looks like, you can&#8217;t protect it.”</em></p>
<p><strong>Björn Hawlitschka</strong>, MACONIA GmbH</p>
</div></div></div></div><div class="fusion-text fusion-text-6" style="--awb-text-color:#000000;"><p><em><strong>What measures would you recommend to companies that are at the beginning of a professional security strategy?</strong></em></p>
<p><strong>Björn Hawlitschka: </strong>The first step is to know your own processes. If you don&#8217;t know what your &#8220;castle&#8221; looks like, you can&#8217;t protect it. Then comes a business impact analysis. And finally, you should carry out realistic emergency exercises. Red team tests &#8211; i.e. external attacks to identify vulnerabilities &#8211; are also highly recommended.</p>
<p><em><strong>How should companies deal with the challenge that security measures are often seen as a cost factor rather than an investment?</strong></em></p>
<p><strong>Björn Hawlitschka: </strong>I recommend two calculation models: Firstly, how much would real damage cost? Second, what business will I miss out on if I don&#8217;t have certifications or ISMS/BCM systems in place? More and more customers, especially in the banking sector, are demanding proof of security. If you have nothing to show, you will lose business.</p>
<p><em><strong>What physical security measures are particularly important for companies with distributed locations or hybrid working models?</strong></em></p>
<p><strong>Björn Hawlitschka: </strong>If there are several sites, it should be clearly defined who is responsible in which situation &#8211; especially at what level of severity the &#8220;head office&#8221; takes over: Already in an emergency or only in a crisis? This requires defined escalation levels. And, of course, regular emergency drills &#8211; both local and central. The important thing to remember is that even small incidents can have a big impact. That&#8217;s why preparation is everything.</p>
</div></div></div><div class="fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-text fusion-text-7" style="--awb-text-color:#000000;"><p>Security begins with the right system. NOX systems stand for flexible and economical solutions &#8211; for security infrastructures that grow with your needs. <a href="https://noxsystems.com/en/security-solutions/">&gt; Learn More</a></p>
</div><div class="accordian fusion-accordian" style="--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:right;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color2);--awb-background-color:var(--awb-color2);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color8);--awb-title-color:#000000;--awb-content-color:#000000;--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:#000000;--awb-toggle-active-accent-color:#000000;--awb-title-font-family:&quot;Lato&quot;;--awb-title-font-weight:700;--awb-title-font-style:normal;--awb-title-font-size:20px;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);"><div class="panel-group fusion-toggle-icon-right fusion-toggle-icon-unboxed" id="accordion-8506-2"><div class="fusion-panel panel-default panel-005bac1c7d976d8d2 fusion-toggle-no-divider fusion-toggle-boxed-mode" style="--awb-title-color:var(--awb-color8);"><div class="panel-heading"><h4 class="panel-title toggle" id="toggle_005bac1c7d976d8d2"><a aria-expanded="false" aria-controls="005bac1c7d976d8d2" role="button" data-toggle="collapse" data-parent="#accordion-8506-2" data-target="#005bac1c7d976d8d2" href="#005bac1c7d976d8d2"><span class="fusion-toggle-icon-wrapper" aria-hidden="true"><i class="fa-fusion-box active-icon fa-angle-up fas" aria-hidden="true"></i><i class="fa-fusion-box inactive-icon fa-angle-down fas" aria-hidden="true"></i></span><span class="fusion-toggle-heading">Interview partner </span></a></h4></div><div id="005bac1c7d976d8d2" class="panel-collapse collapse " aria-labelledby="toggle_005bac1c7d976d8d2"><div class="panel-body toggle-content fusion-clearfix">
<p>MACONIA stands for independent, impartial, in-depth security consulting &#8211; backed by an experienced team that combines in-depth expertise with practical relevance, integrity and the highest quality standards. Find out more: <a href="http://www.maconia.de">www.maconia.de</a></p>
</div></div></div></div></div></div></div></div></div>
<p>Der Beitrag <a href="https://noxsystems.com/en/geopolitical-risks-and-corporate-protection/">Only Those Who Know Their Critical Processes Can Protect Them</a> erschien zuerst auf <a href="https://noxsystems.com/en/">NOX SYSTEMS | Security beyond limits</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://noxsystems.com/en/geopolitical-risks-and-corporate-protection/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
