Fairs 2026
- ACFEA 2026, 12. to 13. Mai 2026, Bonn
- ISX 2026 – 3. Juni Frankfurt, 9. Juni München, 16. Juni Hamburg, 23. Juni Düsseldorf
- it-sa 2026, 27. to 29. Oktober 2026, Nürnberg
February 2026

😾 Baden-Württemberg again: Following the attack on the state’s marketing campaign, „The Länd“ (as we reported), the Schorndorf children’s project „Forschungsfabrik“ has now been affected. 😾
Around 20,000 people are believed to have been affected by the cyberattack – email addresses, passwords, and location data were apparently stolen (see report).
❓ The crucial question is: How can organizations effectively protect themselves – and prevent incidents of this kind? ❓
Cybersecurity doesn’t begin in an emergency, but with proactive prevention. Now is the right time to act.
We support you with suitable security solutions – reliable, field-tested, and entirely made and hosted in Germany.
January 2026

‼️ Free tickets for the ISX IT Security Conference in June 2026 in Frankfurt, Munich, Hamburg and Düsseldorf are available until January 31st 😄
In June, the ISX IT Security Conference will once again offer a mix of expert presentations and practical insights on highly topical cybersecurity issues, with ample opportunity for professional exchange. The target audience includes managers and service providers focused on IT security and cloud security, data security/data protection, IT consulting and integration, and (managed) security services.
Excerpt from the program:
RESILIENCE & CRISIS MANAGEMENT
Emergency Management • Cyber Incident Simulation • Business Continuity Plan • Crisis Communication • Human Resilience • Focus on Compliance: NIS2 and DORA • Focus on Supply Chain: Supply Chain Security & Vendor Risk Management
ATTACK SURFACE MANAGEMENT
Hacker Tools • Insider Risk Management • Hybrid Attack Scenarios • Prioritization of Security Measures • Microsegmentation • Managed Security Services
DIGITAL SOVEREIGNTY
Selection, Availability, Autonomy • Sovereign Security • Digital Sovereignty & Hyperscalers in Cybersecurity: Opportunities and Risks • Security Solutions from Europe/Germany
AI SECURITY
Attack Vectors • Manipulation of AI Agents • Cloud and Data Strategies for AI • Risk Scores, Firewall and Security Concepts • AI Guidelines • Technical Safeguards • AI-Powered Awareness Programs

‼️2026 – The cyber threat landscape continues to escalate ‼️
AI-powered attacks, automated exploit chains, and highly professional cybercrime groups are massively increasing the speed, reach, and impact of attacks. Modern ransomware operates in a modular, lateral, and data-driven manner – focusing on exfiltration, persistence, and targeted extortion.
The figures for the end of 2025 are alarming: Since 2020, the number of successful cyberattacks has tripled, with an increase of 44.5% in 2025 alone (see press releases). Reported attacks include ransomware, data theft, supply chain compromises, unauthorized access, as well as AI-powered phishing and deepfakes that bypass traditional security mechanisms.
Critical infrastructure (KRITIS) is no longer the only sector affected. Attacks affect companies of all sizes and sectors – from industry and trade to SMEs and craft businesses. Hybrid IT, legacy systems, and a lack of transparency in the supply chain increase the attack surface.
With NIS-2, cybersecurity definitively becomes a management responsibility.
Resilient zero-trust architectures, continuous monitoring, incident response capabilities, and measurable security governance are required. Modern attacks no longer target individual systems but entire IT and OT infrastructures. At the same time, phishing campaigns and deepfakes are reaching a new level of sophistication through the use of artificial intelligence – traditional detection mechanisms are increasingly reaching their limits.
‼️ Cybersecurity is no longer an IT project – it’s a strategic resilience issue. ‼️
——-

❓Are you sure that only reputable companies are using your solar parks?
More and more solar parks are supplying the necessary energy and playing a key role in Germany’s energy transition. This rapidly growing importance of photovoltaics simultaneously requires a greater focus on comprehensive security concepts. The rapid expansion significantly increases the need for action on the part of grid operators and municipalities.
With the increasing grid relevance of solar parks, the demands on their IT and OT security are rising. Many photovoltaic systems now perform functions that place them within the context of critical infrastructure.
The ongoing digitalization – for example, through networked inverters, remote maintenance, and monitoring systems – simultaneously increases the attack surface. Common vulnerabilities include unsecured remote access, a lack of separation between IT and OT, and outdated firmware.
The German Federal Office for Information Security (BSI) regularly warns of cyber risks in the energy supply sector. For operators and municipal utilities, this means that cybersecurity must be continuously and systematically integrated into operations
———

😾 Ruthless! No access for emergencies, no electricity in the freezing winter…
⚠️ Attacks on critical infrastructure affect innocent people.
Like the recent power outage in Berlin or the cyberattack on the Roth district hospital – the emergency room had to be closed!
People are left in distress, with no support – THAT is inhumane. Customers can hardly protect themselves in these and many other situations. The responsibility lies with the operators.
———————

🔐 Embarrassing – Cyberattack on State Shop 🙀
The recent incident at the beginning of the year – a cyberattack on ‘The Länd’ – once again demonstrates that security vulnerabilities can compromise sensitive customer data. The online shop of the Baden-Württemberg state marketing campaign was attacked – and this was only discovered through customer reports.
👉 Shop operators also have a responsibility: IT security, regular updates, and preventative checks are not optional extras, but a legally binding obligation to their customers.
‼️ Data protection begins with prevention. Act now.
———————

🎆 Good vibes for 2026 – we wish all IT security professionals the best!
🔐 Greater awareness of cyber threats
🛡️ A sustainably high level of security awareness
🚨 Early and successful detection of attacks
👉 Use the start of the year to review your security strategy:
Are your awareness, detection, and response capabilities truly up to date with the current threat level?
💬 Let’s talk – about practical IT security that is not only compliant but also effective in a real-world scenario.
Interested? Please send us an email to m.betz@bcm5.de.