> Introduction of an InfoSec strategy
> Introduction of an ISMS (*)
> Introduction of regulations and directives
> Introduction of security measures
> Introduction of requirements for:
° Data protection
° IT security
> Very close cooperation with:
° Legal and data privacy units
° IT Security
° CIO
° Decentralized IT managers
° Faculties
° Central Services and
° External stakeholders