Cybersecurity Summit Insights: How Digital Sovereignty Strengthens Incident Response

by Jun 30, 2025

At the recent Cybersecurity Summit in Hamburg, we joined our partner agilimo Consulting to present on the theme: “Cybersecurity made in Germany.” The central question: How can organizations turn digital sovereignty into real operational security – beyond just a buzzword?

This becomes particularly relevant when conventional cybersecurity solutions fail to trigger alerts, yet there are signs of a breach.

👉 Watch the full talk (in German) here.

Ransomware in 2025: Still a Leading Threat Despite Fewer Incidents

Ransomware remains one of the most pressing threats in 2025, despite a decline in reported cases. Joint action against Cybercrime-as-a-Service ecosystems is beginning to yield results: According to Chainalysis, ransomware payments fell by 35% in 2024, totaling $800 million. Germany’s BKA reports that 90% of affected organizations did not pay ransom. Reported ransomware cases in Germany dropped for the first time: 950 in 2024 vs. 1,018 in 2023.

Still, the overall cyber threat landscape remains critical. Germany is among the world’s top four most affected countries. Every day, two to three major ransomware attacks are reported to police – posing serious risks to businesses, public institutions, and critical infrastructure.

Cybersecurity Made in Germany: More Than a Trust Signal

With increasing geopolitical tensions, the origin of IT security solutions has become a strategic factor. At agilimo, “Cybersecurity made in Germany” is more than a label – it’s a key decision criterion, especially for customers in regulated sectors and critical infrastructure.

“Demand for German cybersecurity tools is rising globally. With 90% of established vendors based in the US or Israel, trust in those solutions is declining in many regions.”

— Marcus Heinrich, CEO, agilimo Consulting GmbH

Solutions like THOR and ASGARD, developed and hosted entirely in Germany, ensure compliance, data privacy, and independence from foreign legislation or cloud services.

“Data sovereignty means knowing where your data is, who has access, and how to prevent misuse,” says Heinrich. “It’s not about isolation – it’s about control.”

The choice of THOR and ASGARD is based not only on their technical capabilities, but also on governance, transparency, and auditability of the cybersecurity tools.

Forensic Readiness from the First Minute: THOR in Use at agilimo

In agilimo’s Security Operations Center (SOC), THOR is pre-integrated across all monitored systems – ensuring instant forensic readiness without manual intervention or time-critical engineering. “On all systems we monitor for clients, the THOR scanner is pre-installed. It’s part of our standard deployment,” Heinrich notes.

When an incident crosses a critical threshold, a full scan is launched via the ASGARD Management Center. Within minutes, a complete situational overview is available:

  • What suspicious artifacts were found?
  • Are there signs of persistence or lateral movement?
  • Have any compromised files entered the backup system?

“There’s no need to shut down everything. THOR gives us clear visibility to isolate affected systems quickly and precisely.”

This structured approach gives the incident response team a decisive time advantage:

“We have full forensic analysis from minute one – that’s a real head start. Our IR team can take action immediately.”

– Marcus Heinrich

Summary: Operational Sovereignty with Immediate Response Capabilities

agilimo’s deployment of THOR and ASGARD illustrates how digital sovereignty, advanced forensics, and operational agility can be combined into an effective cyber defense strategy.

Today’s organizations need rapid situational awareness – without waiting for manual investigation or relying on dedicated forensic teams. THOR and ASGARD provide the foundation for true cyber resilience: structured, explainable, and effective – independent of the existing infrastructure.

Key Benefits:

  • Fast, informed decision-making – no more flying blind
  • Complete visibility – even offline, historically, and without cloud dependency
  • Trusted cybersecurity tools – 100% developed and operated in Germany

Organizations that treat forensics as a core security function – not an afterthought – gain crucial advantages: speed, clarity, and control when it matters most.

Discover How to Integrate THOR and ASGARD into Your Cybersecurity Strategy

Interested in applying this approach to your environment? We’ll show you how to seamlessly integrate THOR and ASGARD into your infrastructure – fast, practically, and without disruption.

👉 Contact us through our contact form.

About the author:

Franziska Ploss

Marketing Lead & Content Creation

Subscribe to our Newsletter

Monthly news, tips and insights.

Follow Us

Upgrade Your Cyber Defense with THOR

Detect hacker activity with the advanced APT scanner THOR. Utilize signature-based detection, YARA rules, anomaly detection, and fileless attack analysis to identify and respond to sophisticated intrusions.