Kurt Eder
What makes Cybersecurity different for critical infrastructure?
#1about 2 minutes
Providing essential services for the city of Munich
Stadtwerke München (SWM) is responsible for a wide range of critical infrastructure, including energy, water, mobility, and telecommunications.
#2about 6 minutes
Why minimal downtime is non-negotiable for critical infrastructure
Unlike typical businesses, critical infrastructure like electricity cannot tolerate downtimes of days or even hours, making redundancy a core design principle.
#3about 6 minutes
Defending against professional and state-sponsored cyber units
Cyber threats have evolved from individual script kiddies to highly organized, well-funded military cyber units like Sandworm, changing the entire defensive landscape.
#4about 6 minutes
Managing the long lifecycle of operational technology equipment
Operational technology components have lifecycles of 15 to 40 years, creating a mix of modern and legacy systems that are difficult to secure.
#5about 10 minutes
Why even new OT equipment can be a security risk
Even recently installed OT hardware often lacks modern IT security features like TLS encryption or role-based access control due to long development cycles.
#6about 5 minutes
Navigating a fast-developing landscape of security regulations
Critical infrastructure operators must comply with a growing number of national and international standards like ISO 27000, NIS2, and the Cyber Resilience Act.
#7about 7 minutes
Building trusted partnerships with technology vendors
As system integrators, critical infrastructure providers rely on honest and transparent relationships with vendors to quickly resolve issues and ensure system reliability.
#8about 4 minutes
Using business continuity to prepare for inevitable attacks
Accepting that successful attacks will happen, the focus shifts to robust Business Continuity Management (BCM) to detect, isolate, and recover services.
#9about 15 minutes
Key industry debates on hardware regulation and reporting
The industry is actively debating whether authorities should regulate hardware for critical infrastructure and how to establish effective cyber attack reporting protocols.
#10about 10 minutes
Joining the team: Remote work and language policies
SWM offers flexible remote work options, typically three days from home, but requires a willingness to learn German as it is the primary company language.
#11about 11 minutes
How teams work with agile methods at SWM
Teams at SWM have the autonomy to choose their own work methodologies, often using agile, scrum, or kanban depending on the project's needs.
#12about 10 minutes
The unique culture and benefits of a public utility
Working at SWM provides a strong sense of purpose by serving the city, combined with benefits like job security, unlimited contracts, and pension schemes.
#13about 13 minutes
Fostering diversity and what to expect in hiring
SWM actively promotes a diverse and inclusive environment and looks for self-motivated team players in a straightforward, two-interview hiring process.
#14about 10 minutes
Keeping up with emerging trends in cybersecurity
Staying current involves a multi-path approach of industry networking, continuous learning, and hands-on personal projects, with Zero Trust and AI being key emerging technologies.
Related jobs
Jobs that call for the skills explored in this talk.
Technoly GmbH
Berlin, Germany
€50-60K
Intermediate
Network Security
Security Architecture
+2
Dirk Rossmann GmbH
Burgwedel, Germany
Intermediate
IT Security
zeb consulting
Frankfurt am Main, Germany
Remote
Junior
Intermediate
Senior
Amazon Web Services (AWS)
Cloud Architecture
+1
Matching moments
01:06 MIN
Malware campaigns, cloud latency, and government IT theft
Fake or News: Self-Driving Cars on Subscription, Crypto Attacks Rising and Working While You Sleep - Théodore Lefèvre
01:15 MIN
Crypto crime, EU regulation, and working while you sleep
Fake or News: Self-Driving Cars on Subscription, Crypto Attacks Rising and Working While You Sleep - Théodore Lefèvre
04:17 MIN
Playing a game of real or fake tech headlines
WeAreDevelopers LIVE – You Don’t Need JavaScript, Modern CSS and More
03:38 MIN
Balancing the trade-off between efficiency and resilience
What 2025 Taught Us: A Year-End Special with Hung Lee
05:17 MIN
Europe's push for digital independence from US tech
WeAreDevelopers LIVE – AI, Freelancing, Keeping Up with Tech and More
01:03 MIN
Evaluating tech startup funding and supply chain news
Fake or News: Coding on a Phone, Emotional Support Toasters, ChatGPT Weddings and more - Anselm Hannemann
06:33 MIN
The security challenges of building AI browser agents
AI in the Open and in Browsers - Tarek Ziadé
05:01 MIN
Comparing the security models of browsers and native apps
Developer Time Is Valuable - Use the Right Tools - Kilian Valkhof
Featured Partners
Related Videos
Cyber Security: Small, and Large!
Martin Schmiedecker
Cybersecurity for Software Defined Vehicles
Henning Harbs
Automotive Security Challenges: A Supplier's View
Davor Frkat
Enabling automated 1-click customer deployments with built-in quality and security
Christoph Ruggenthaler
You can’t hack what you can’t see
Reto Kaeser
Unleashing the Power of Developers: Why Cybersecurity is the Missing Piece?!?
Tino Sokic
Security Pitfalls for Software Engineers
Jasmin Azemović
Getting under the skin: The Social Engineering techniques
Mauro Verderosa
Related Articles
View all articles
.png?w=240&auto=compress,format)


From learning to earning
Jobs that call for the skills explored in this talk.

Siemens Energy
Erlangen, Germany

EKS Elektrotechnik GmbH
Erlangen, Germany

Siemens AG
München, Germany
API
GIT
Ruby
Docker
Ansible
+4


Schwarz Dienstleistung KG
Neckarsulm, Germany
Go
C++
Rust
Python
Powershell


OMM Solutions GmbH
Offenbach am Main, Germany
€70-90K
Network Security


naturenergie netze GmbH
Rheinfelden (Baden), Germany