Continuous Transformation Blog

Streamlined IT Security Management with LeanIX Survey

Written by Ruth Reinicke | August 25, 2016

“51% of all companies in Germany became victims of cybercrime last year. This has resulted in damages amounting to 51 billion Euros per year”. 


A large-scale cyber attack on the “Parlakom” network of the German Bundestag (parliament) in 2015, the theft of nearly seven million sets of login data on Dropbox the year before, the cyber attack on 100 banks in 30 countries with theft of up to one billion Euros or the security leak at the Cologne/Bonn airport which made the strictly confidential emergency plan openly available on the airport website: As these examples show, companies and public institutions face increasing challenges in the field of IT security when it comes to guaranteeing the best protection of important and confidential data.


According to Bitkom, 51 percent of all companies in Germany were victims of digital corporate espionage, sabotage or data theft in the last two years. According to the association, the annual damage amounts to 51 billion Euros. The reasons for the increasing amount of cyber attacks and violations of data protection and data security are obvious. In the course of the digital transformation, data is becoming an important company asset. Protecting this is turning into a constantly growing challenge.

That is why most companies have vehemently invested in the latest IT security technology in recent years. Due to the increasingly complex IT landscapes, however, companies have to prioritize their activities. They may have to focus their efforts on the most critical applications and data, for example. Enterprise Architecture (EA) management offers the perfect framework to anchor IT security in a company.

In a series of blog articles over the next four weeks we will be presenting a streamlined approach for IT security management with the aid of the LeanIX Survey Workflow. Follow our blog to read in detail about the real-life case study of a financial company using surveys for their regular IT security audit, what an effective IT security management looks like, and how to implement an EA-driven approach for IT security. You can also download our white paper to find out even more about the use of Surveys!