A good example is the recent PrintNightmare vulnerability we informed you about. We performed a technical analysis on the vulnerability over the weekend, immediately after the announcement, to understand the risk, the impact to our customers and the attack vectors. Based on the technical analysis, we determined follow-up steps. This structured approach is a permanent part of our working method and culture; always perform an analysis first, involve all relevant stakeholders and only then determine the next steps. In this way, we ensure a well-considered approach to vulnerabilities and potential risks, with data confidentiality always at the center.
Of course, this is not up to us alone but a joint effort. We can learn from each other, join forces and discuss how to work together on this. Security, privacy and compliance is a broader issue, about which we are already in discussion with various customers and would also like to spar with you. We do not have a monopoly on wisdom and would also like to hear your insights in order to jointly arrive at an integral security policy.