Offices
en
English
de
German
Contact
Cyber Security
Services
Services
Cyber Incident Response and Crisis Center
Offensive Security
Cyber Strategy & Governance
Cyber Academy
Security Operations Center
Featured
How secure is sending mail via SMTP?
The Simple Mail Transfer Protocol (SMTP) is one of the most frequently used network protocols
How cybercriminals infiltrate organisations
We hear all the time about cyber-attacks and hackers infiltrating institutions and businesses. But what exactly does this mean? How do cyber criminals infiltrate a company?
Insights
Solutions
Solutions
Cyber Emergency Preparedness
Healthcare Security Assessment
BDO SafeGuard - 24/7-Security monitoring
Ad-Hoc Incident Response Team
NIS-2
Featured
BDO SafeGuard - 24/7-Security monitoring
SafeGuard, BDO's 24/7 security monitoring solution, offers first-class, cloud- and AI-based protection for your organisation.
How cybercriminals infiltrate organisations
We hear all the time about cyber-attacks and hackers infiltrating institutions and businesses. But what exactly does this mean? How do cyber criminals infiltrate a company?
About us
Home
People
Stig Griebenow
Stig Griebenow
Consultant | Cyber Strategy & Governance
Contact
Email
+49 173 6834407
Hamburg
vCard
Executive summary
Practice areas
Information Security Management Systems (ISMS)
Cyber Security Due Diligence
Cyber Compliance
AI Governance
Industry expertise
Insurance and Finance
Healthcare
Engineering
Publications
Griebenow, Stig, et al. "
Open-Vocabulary Robotic Object Manipulation using Foundation Models.
"
Contact
Email
+49 173 6834407
Hamburg
vCard