{"id":1650,"date":"2021-05-12T12:55:57","date_gmt":"2021-05-12T10:55:57","guid":{"rendered":"https:\/\/sast-solutions.com\/blog-en\/?p=1650"},"modified":"2021-05-12T13:04:29","modified_gmt":"2021-05-12T11:04:29","slug":"interview-with-ralf-kempf-and-norbert-klettner-cybersecurity-logistics","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/12\/interview-with-ralf-kempf-and-norbert-klettner-cybersecurity-logistics\/","title":{"rendered":"Interview with Ralf Kempf and Norbert Klettner \u2013 Cybersecurity in logistics: Multinational attacks on the weakest links in the chain"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1651 alignleft\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/SAST-Blog_Foto_Ralf_Norbert-300x200.jpg\" alt=\"SAST Blog: Interview with Ralf Kempf and Norbert Klettner \u2013 Cybersecurity in logistics\" width=\"300\" height=\"200\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/SAST-Blog_Foto_Ralf_Norbert-300x200.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/SAST-Blog_Foto_Ralf_Norbert-1024x683.jpg 1024w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/SAST-Blog_Foto_Ralf_Norbert-768x512.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/SAST-Blog_Foto_Ralf_Norbert-1536x1024.jpg 1536w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/SAST-Blog_Foto_Ralf_Norbert.jpg 1599w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>How should companies in the port and transportation logistics sector tackle cybersecurity? Can smaller and midmarket companies even protect themselves against the growing threats? Our CTO Ralf Kempf and his colleague Norbert Klettner, Managing Director of AKQUINET PORT CONSULTING, were interviewed on this subject by DVZ, a German transportation newspaper.<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p>Excerpts from the interview are provided below.<\/p>\n<h2><strong>DVZ: What exactly do cyberattacks on companies in transportation, logistics, and shipping look like?<\/strong><\/h2>\n<p><strong><em>Ralf Kempf:<\/em> <\/strong>The attack pattern is usually similar: The virus enters the network through an unprotected user or computer. If any of the infected computers has an active VPN, the spread of the virus is nearly impossible to stop. This has happened to quite a few large logistics companies. The attackers are very professional and send emails that appear to be very genuine. This attack vector is not limited to the logistics sector, of course; it is used everywhere, every day.<\/p>\n<h2><strong>DVZ: Does it affect smaller companies more than larger ones?<\/strong><\/h2>\n<p><strong><em>Norbert Klettner:<\/em><\/strong> No, but we often only hear about attacks on large corporations in the media. Smaller companies are just as affected. After all, particularly in the transportation, logistics, and shipping sectors, many players interact with one another, are connected around the world, and exchange data through a wide variety of systems. Imagine it as a huge, highly fragmented system with many individual gears. Attackers seek out the weakest link in the chain: usually smaller, less protected companies where a cyberattack can succeed quickly.<\/p>\n<h2><strong>DVZ: Do the companies in this sector protect themselves less than companies in other sectors?<\/strong><\/h2>\n<p><strong><em>Norbert Klettner:<\/em><\/strong> You could say that businesses here have largely been managed \u201ctraditionally\u201d for a long time. Port logistics companies, for example, concentrate on loading and unloading ships most efficiently. The central importance of the technologies behind these processes, which now represent their backbone, reached the management board later than in other industry sectors. In the meantime, large companies have developed cybersecurity strategies, but many midmarket companies have not yet.<\/p>\n<h2><strong>DVZ: Is the risk from cyberattacks still underestimated?<\/strong><\/h2>\n<p><strong><em>Norbert Klettner:<\/em><\/strong> Many companies suspect or even know that there are vulnerabilities in their systems. Nonetheless, they either think, \u201cWhat can I do about it anyway?\u201d or, \u201cI won\u2019t be affected.\u201d But giving up and hoping aren\u2019t viable company strategies.<\/p>\n<p><strong><em>Ralf Kempf:<\/em> <\/strong>Yes, it\u2019s truly alarming how often companies are quite aware of vulnerabilities, but do nothing to eliminate them. Findings from security audits often remain hidden in drawers. This is because these companies lack a culture where mistakes are allowed, where the only things that matter are creating transparency and identifying faults. Instead, the focus often lies on perceived employee misconduct, however unintentional it might be.<\/p>\n<h2><strong>DVZ: To what extent is it even possible to protect yourself?<\/strong><\/h2>\n<p><strong><em>Ralf Kempf:<\/em><\/strong> The best response to a cyberattack is highly dependent on the respective attack vector. But what all responses have in common is that they require a clearly organized risk management structure at the company, with defined processes on how to proceed through risk scenarios. We often advise companies with SAP systems and we\u2019ve noticed that many system managers shy away from securing their systems completely \u2013 because this requires a project budget, as well as permanent staff resources. But this expense is very small compared to the damage that criminal hackers can cause.<\/p>\n<p><em>Article by Claudia Behrend, Dipl.-Jur., author, and freelance journalist.<\/em><\/p>\n<p>This interview was published in full (in German) under:<\/p>\n<p><a href=\"https:\/\/www.dvz.de\/rubriken\/detail\/news\/cybersecurity-angreifer-suchen-sich-das-schwaechste-glied-der-kette.html\" target=\"_blank\" rel=\"noopener\">https:\/\/www.dvz.de\/rubriken\/detail\/news\/cybersecurity-angreifer-suchen-sich-das-schwaechste-glied-der-kette.html<\/a><\/p>\n<p>Republished with the friendly approval of DVZ.<\/p>\n<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-1652\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Norbert-300x300.jpg\" alt=\"Norbert Klettner AKQUINET\" width=\"300\" height=\"300\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Norbert-300x300.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Norbert-150x150.jpg 150w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Norbert.jpg 600w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><br \/>\nNorbert Klettner (<\/strong><strong>Managing Director AKQUINET PORT CONSULTING)<\/strong><\/p>\n<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-1653\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Ralf-300x300.jpg\" alt=\"Ralf Kempf SAST SOLUTIONS\" width=\"300\" height=\"300\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Ralf-300x300.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Ralf-150x150.jpg 150w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/Ralf.jpg 600w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><br \/>\nRalf Kempf (CTO SAST SOLUTIONS)<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>More articles on the topic of cybersecurity:<\/h2>\n<blockquote class=\"wp-embedded-content\" data-secret=\"75bEk5Up8x\"><p><a href=\"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/23\/sap-security-rest-easy-with-a-threat-intelligence-solution\/\">SAP security: Rest easy with a threat intelligence solution<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;SAP security: Rest easy with a threat intelligence solution&#8221; &#8212; SAST BLOG\" src=\"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/23\/sap-security-rest-easy-with-a-threat-intelligence-solution\/embed\/#?secret=75bEk5Up8x\" data-secret=\"75bEk5Up8x\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"2WWV27V3fx\"><p><a href=\"https:\/\/sast-solutions.com\/blog-en\/2019\/11\/21\/important-elements-of-a-cybersecurity-strategy\/\">The most important elements of a Cybersecurity Strategy<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;The most important elements of a Cybersecurity Strategy&#8221; &#8212; SAST BLOG\" src=\"https:\/\/sast-solutions.com\/blog-en\/2019\/11\/21\/important-elements-of-a-cybersecurity-strategy\/embed\/#?secret=2WWV27V3fx\" data-secret=\"2WWV27V3fx\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How should companies in the port and transportation logistics sector tackle cybersecurity? Can smaller and midmarket companies even protect themselves against the growing threats? Our CTO Ralf Kempf and his colleague Norbert Klettner, Managing Director of AKQUINET PORT CONSULTING, were interviewed on this subject by DVZ, a German transportation newspaper.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[25,156,61,80,114],"class_list":["post-1650","post","type-post","status-publish","format-standard","hentry","category-sap-threat-detection","tag-cyber-attack","tag-cyber-security","tag-rfc-interface","tag-sap-security","tag-threat-detection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity in logistics: An interview with two AKQUINET experts<\/title>\n<meta name=\"description\" content=\"Companies in transport, logistics and shipping are also exposed to cyberattacks and the risks are still underestimated.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/12\/interview-with-ralf-kempf-and-norbert-klettner-cybersecurity-logistics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity in logistics: An interview with two AKQUINET experts\" \/>\n<meta property=\"og:description\" content=\"Companies in transport, logistics and shipping are also exposed to cyberattacks and the risks are still underestimated.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/12\/interview-with-ralf-kempf-and-norbert-klettner-cybersecurity-logistics\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-12T10:55:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-12T11:04:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/SAST-Blog_Foto_Ralf_Norbert.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1599\" \/>\n\t<meta property=\"og:image:height\" content=\"1066\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Cybersecurity in logistics: An interview with two AKQUINET experts\" \/>\n<meta name=\"twitter:description\" content=\"Companies in transport, logistics and shipping are also exposed to cyberattacks and the risks are still underestimated.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/SAST-Blog_Foto_Ralf_Norbert.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/05\\\/12\\\/interview-with-ralf-kempf-and-norbert-klettner-cybersecurity-logistics\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/05\\\/12\\\/interview-with-ralf-kempf-and-norbert-klettner-cybersecurity-logistics\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"Interview with Ralf Kempf and Norbert Klettner \u2013 Cybersecurity in logistics: Multinational attacks on the weakest links in the chain\",\"datePublished\":\"2021-05-12T10:55:57+00:00\",\"dateModified\":\"2021-05-12T11:04:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/05\\\/12\\\/interview-with-ralf-kempf-and-norbert-klettner-cybersecurity-logistics\\\/\"},\"wordCount\":641,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/05\\\/12\\\/interview-with-ralf-kempf-and-norbert-klettner-cybersecurity-logistics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/SAST-Blog_Foto_Ralf_Norbert-300x200.jpg\",\"keywords\":[\"Cyber Attack\",\"Cyber Security\",\"RFC Interface\",\"SAP Security\",\"Threat Detection\"],\"articleSection\":[\"SAP Threat Detection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/05\\\/12\\\/interview-with-ralf-kempf-and-norbert-klettner-cybersecurity-logistics\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/05\\\/12\\\/interview-with-ralf-kempf-and-norbert-klettner-cybersecurity-logistics\\\/\",\"name\":\"Cybersecurity in logistics: An interview with two AKQUINET experts\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/05\\\/12\\\/interview-with-ralf-kempf-and-norbert-klettner-cybersecurity-logistics\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/05\\\/12\\\/interview-with-ralf-kempf-and-norbert-klettner-cybersecurity-logistics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/SAST-Blog_Foto_Ralf_Norbert-300x200.jpg\",\"datePublished\":\"2021-05-12T10:55:57+00:00\",\"dateModified\":\"2021-05-12T11:04:29+00:00\",\"description\":\"Companies in transport, logistics and shipping are also exposed to cyberattacks and the risks are still underestimated.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/05\\\/12\\\/interview-with-ralf-kempf-and-norbert-klettner-cybersecurity-logistics\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/05\\\/12\\\/interview-with-ralf-kempf-and-norbert-klettner-cybersecurity-logistics\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/05\\\/12\\\/interview-with-ralf-kempf-and-norbert-klettner-cybersecurity-logistics\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/SAST-Blog_Foto_Ralf_Norbert.jpg\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/SAST-Blog_Foto_Ralf_Norbert.jpg\",\"width\":1599,\"height\":1066,\"caption\":\"SAST Blog: Interview with Ralf Kempf and Norbert Klettner \u2013 Cybersecurity in logistics\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/05\\\/12\\\/interview-with-ralf-kempf-and-norbert-klettner-cybersecurity-logistics\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Interview with Ralf Kempf and Norbert Klettner \u2013 Cybersecurity in logistics: Multinational attacks on the weakest links in the chain\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity in logistics: An interview with two AKQUINET experts","description":"Companies in transport, logistics and shipping are also exposed to cyberattacks and the risks are still underestimated.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/12\/interview-with-ralf-kempf-and-norbert-klettner-cybersecurity-logistics\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity in logistics: An interview with two AKQUINET experts","og_description":"Companies in transport, logistics and shipping are also exposed to cyberattacks and the risks are still underestimated.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/12\/interview-with-ralf-kempf-and-norbert-klettner-cybersecurity-logistics\/","og_site_name":"SAST BLOG","article_published_time":"2021-05-12T10:55:57+00:00","article_modified_time":"2021-05-12T11:04:29+00:00","og_image":[{"width":1599,"height":1066,"url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/SAST-Blog_Foto_Ralf_Norbert.jpg","type":"image\/jpeg"}],"author":"securityblog","twitter_card":"summary_large_image","twitter_title":"Cybersecurity in logistics: An interview with two AKQUINET experts","twitter_description":"Companies in transport, logistics and shipping are also exposed to cyberattacks and the risks are still underestimated.","twitter_image":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/SAST-Blog_Foto_Ralf_Norbert.jpg","twitter_misc":{"Written by":"securityblog","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/12\/interview-with-ralf-kempf-and-norbert-klettner-cybersecurity-logistics\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/12\/interview-with-ralf-kempf-and-norbert-klettner-cybersecurity-logistics\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"Interview with Ralf Kempf and Norbert Klettner \u2013 Cybersecurity in logistics: Multinational attacks on the weakest links in the chain","datePublished":"2021-05-12T10:55:57+00:00","dateModified":"2021-05-12T11:04:29+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/12\/interview-with-ralf-kempf-and-norbert-klettner-cybersecurity-logistics\/"},"wordCount":641,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/12\/interview-with-ralf-kempf-and-norbert-klettner-cybersecurity-logistics\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/SAST-Blog_Foto_Ralf_Norbert-300x200.jpg","keywords":["Cyber Attack","Cyber Security","RFC Interface","SAP Security","Threat Detection"],"articleSection":["SAP Threat Detection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/12\/interview-with-ralf-kempf-and-norbert-klettner-cybersecurity-logistics\/","url":"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/12\/interview-with-ralf-kempf-and-norbert-klettner-cybersecurity-logistics\/","name":"Cybersecurity in logistics: An interview with two AKQUINET experts","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/12\/interview-with-ralf-kempf-and-norbert-klettner-cybersecurity-logistics\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/12\/interview-with-ralf-kempf-and-norbert-klettner-cybersecurity-logistics\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/SAST-Blog_Foto_Ralf_Norbert-300x200.jpg","datePublished":"2021-05-12T10:55:57+00:00","dateModified":"2021-05-12T11:04:29+00:00","description":"Companies in transport, logistics and shipping are also exposed to cyberattacks and the risks are still underestimated.","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/12\/interview-with-ralf-kempf-and-norbert-klettner-cybersecurity-logistics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2021\/05\/12\/interview-with-ralf-kempf-and-norbert-klettner-cybersecurity-logistics\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/12\/interview-with-ralf-kempf-and-norbert-klettner-cybersecurity-logistics\/#primaryimage","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/SAST-Blog_Foto_Ralf_Norbert.jpg","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/05\/SAST-Blog_Foto_Ralf_Norbert.jpg","width":1599,"height":1066,"caption":"SAST Blog: Interview with Ralf Kempf and Norbert Klettner \u2013 Cybersecurity in logistics"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/05\/12\/interview-with-ralf-kempf-and-norbert-klettner-cybersecurity-logistics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"Interview with Ralf Kempf and Norbert Klettner \u2013 Cybersecurity in logistics: Multinational attacks on the weakest links in the chain"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1650","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=1650"}],"version-history":[{"count":5,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1650\/revisions"}],"predecessor-version":[{"id":1658,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1650\/revisions\/1658"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=1650"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=1650"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=1650"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}