Media and culture – infrastructures of particular public interest (IT Security Act 2.0)
Why IT security is now a top priority
In today’s digital media landscape, not only are the demands on content production and distribution increasing, but so are the risks posed by cyber threats. The IT Security Act 2.0 explicitly classifies the media and cultural sector as infrastructure of particular public interest. This means that large media companies, broadcasters, and cultural institutions must meet the same strict requirements as KRITIS operators (critical infrastructures).
The aim of the law is to better protect IT systems and digital processes in order to minimize the risk of failure for the state, the economy, and society. Addressing the expanded legal requirements at an early stage not only offers protection against cyberattacks, but also strengthens reputation and competitiveness.
Overview of relevant laws and standards
IT Security Act 2.0 (IT-Sig 2.0): Extended regulations on cyber defense and new reporting requirements for incidents.
ISO 27001: Internationally recognized standard for establishing an information security management system (ISMS).
IT-Grundschutz: BSI-recommended approach with detailed building blocks for the German market.
GDPR (EU-DS-GVO): European data protection regulation with growing importance for media companies.
These guidelines and laws ensure the confidentiality, integrity, and availability of information. This is particularly important for media and cultural companies that manage sensitive data from informants, artists, or partners.
Typical challenges for media and cultural companies
- Diverse IT systems and platforms: From streaming servers to editorial systems to content delivery networks – as the complexity of IT infrastructure increases, so do security requirements.
- High public visibility: IT security incidents can cause lasting damage to the trust of readers, viewers, and advertising partners.
- Data protection and copyright: Both personal data and copyright-protected content must be protected against theft and manipulation.
- Cost and time pressure: The challenge is to act quickly without compromising IT security.
Ensure compliance security
The strict requirements of TISAX, ISO 27001, and other standards leave little room for error. QSEC guides you step by step through all relevant compliance requirements and ensures that measures are fully documented and stored in an audit-proof manner.
Your advantages at a glance
What our customers say
- In summary, we are very satisfied with the performance of QSEC and will continue to develop and use the software intensively in the future. The manufacturer of the software, Nexis GRC, is a reliable partner for us, always providing us with the best possible support thanks to its decades of experience in implementing global GRC and ISMS projects.Dr. Paul-Martin Steffen, Head of Data Protection and Information Security, DSW 21 Dortmunder Stadtwerke AG
In the end, QSEC was convincing in the cost-benefit analysis and in terms of scalability as a single-source tool. QSEC supports the dissemination of a uniform understanding of processes. The system acts as a central platform in which all business processes are recorded.
Marcel Reifenberger, Chief Information Security Officer & CSO, CANCOM SE- In Nexis GRC, we have found a partner that speaks our "language" and responds openly to our requirements and ideas. The partnership with Nexis GRC has convinced me throughout the entire duration of the collaboration.Thomas Prigge, Information Security Officer, HanseMerkur Krankenversicherung AG
- Auditing our infrastructure has become much easier and more efficient with the support of QSEC. Based on the auditors' positive assessment of the system's performance, we will continue to expand QSEC in line with our requirements.Hardy Krüger, Data Protection Officer, Information Security Officer and Head of Document Management, Harzklinikum Dorothea Christiane Erxleben GmbH
- The methods and processes already integrated in the standard QSEC have significantly supported us in the professional development and operation of our information security management system. The maturity assessment and development enable us to continuously operate, monitor and further develop our Techem ISMS with QSEC in a resource-saving manner.Sebastian Fingerloos, Head of Information Security, Techem GmbH
ISMS, GRC, and data protection software QSEC:
QSEC – the information security management system (ISMS)
ISMS with QSEC means complete support for all processes relevant to information security management in accordance with the requirements
- of ISO 27001 and/or
- BSI IT-Grundschutz,
including the implementation of data protection requirements in accordance with GDPR.
This allows you to plan your information security management on a daily basis
- plan (Plan)
- implement (Do)
- check (Check) and
- improve (Law)
The ISMS tool QSEC guides users methodically and clearly through all task areas with workflow, wizard, and task support, and helps with the cost-saving and resource-optimized implementation of information security management through extensive content and best practices.
Selected success stories
DSW21 on the successful introduction of an Information Security Management System (ISMS) with QSEC
Cancom on the global introduction of an Information Security Management System (ISMS) in accordance with ISO/IEC 27001 with QSEC
Techem on the challenges and experiences in information security and risk management with QSEC
Harzklinikum Dorothea Christiane Erxleben on software-supported security management in accordance with B3S Health, ISO 27001 and GDPR with QSEC
HanseMerkur on the development of a holistic management system taking into account the insurance law aspects according to VAIT
Take action now: Take the next step with QSEC!
Rely on holistic information security management that meets your requirements - QSEC is a reliable partner at your side.
Request a live demo:
Experience QSEC in action and let us show you how our ISMS software solves your challenges.
Download ISO 27001 checklist:
Find out which steps are crucial for a successful information security management system.
Upcoming Webinars
Grundschutz++ in 20 minutes: the BSI's next step
Date: October 29, 2025 | 4:00 p.m.
In this compact live session, Jonas Link will take you on a clear and practical introduction to the new Grundschutz++. He will show you how the requirements have fundamentally changed, what advantages the new must/should/can structure brings and why Grundschutz++ will replace the previous IT Grundschutz.
What to expect:
The most important differences to the previous IT baseline protection
The new focus on target objects instead of classic building blocks
Clear reduction and structuring of requirements
Outlook: Transition periods, next steps and practical experience