Videos

Latest videos

Watch the latest video blogs and webinar recordings. Stay up to date on new trends in the cybersecurity and identity industry to meet and exceed key business challenges.
Analyst Chat
Analyst Chat #206: Access Denied? The Role of Physical Access in Business Resilience
Mar 18, 2024
Matthias invited Martin to discuss the importance of physical access control in the context of identity and access management (IAM) and cybersecurity. Martin highlights the three layers of access control: physical access, logical access to systems, and authentication and authorization. They also explore the impact of regulations, such as the Digital Operations Resilience Act (DORA), on the requirements for physical security. The conversation delves into the integration of physical access control with identity management systems and the challenges and opportunities in this...
Webinar Recording
Decentralized Identity – a Key to Reusing Identity for Improved Security and User Experiences
Mar 15, 2024
Decentralized identity has earned a place in identity management for its capacity to increase privacy and security, while improving the user experience. It is fundamental to creating a reusable verified identity which enables numerous use cases such as reusable KYC, proof of employment, remote onboarding and passwordless authentication.
Webinar Recording
Unlocking Zero Trust Network Access
Mar 14, 2024
Zero Trust Network Access (ZTNA) is becoming increasingly essential as organizations adapt to remote work, cloud adoption, and the growing sophistication of cyber threats. As a result, ZTNA solutions play a critical role in today's cybersecurity landscape by providing a holistic approach to secure access to business applications and resources regardless of user location. These solutions fundamentally align with the principles of Zero Trust, extending its influence across devices, networks, systems, applications, and data. This webinar provides a comprehensive overview of ZTNA solutions,...
Webinar Recording
Mastering CIAM: Advanced Techniques for Designing a Resilient CIAM Program
Mar 13, 2024
In today's digital landscape, mastering CIAM is crucial for IT professionals. Challenges like imperfect client touchpoints, high abandonment rates, and limited system insights hinder best practices. Join us to explore and overcome these hurdles, enhancing user experiences through strategic CIAM implementation. Explore advanced CIAM techniques in our webinar. From implementing best practices to deploying APIs for user insights, discover strategies to reduce abandonment rates. Unlock techniques for enhancing end-user engagement and revenue, supported by real-world testimonials. Learn to...
Analyst Chat
Analyst Chat #205: From Indelible Ink to Quantum-Safe Computing - Digital Signatures
Mar 11, 2024
In this episode, Mike Small discusses the history and role of digital signatures. He explains that digital signatures are the modern-day equivalent of indelible ink and are fundamental to the security of everything we do digitally. The foundation of digital signatures lies in the use of public-private key pairs, which allow for secure message exchange and verification.
Webinar Recording
Proactive Cyber Defense with Intelligent SIEM Platforms
Mar 08, 2024
Security information and event management (SIEM) solutions have dominated the enterprise security market for nearly two decades, but due to high operating costs, a shortage of skilled security experts, and the rapid pace of change in the business IT and cyber threat environments, traditional SIEMs are no longer effective. A new generation of SIEMs has emerged.
Webinar Recording
Road to EIC: Exploring the Power of Decentralized Identity Solutions
Mar 07, 2024
Decentralized Identity is pivotal in the digital era, offering a secure, privacy-centric identity solution. In contrast to traditional systems, which are centralized and prone to breaches, Decentralized Identity is built on blockchain technology. With Decentralized Identity, users have control over their data, reducing the risk of identity theft. Interoperability is enhanced, enabling secure authentication across platforms without a central authority. Decentralized Identity aligns with privacy regulations like the EU’s GDPR, emphasizing user consent and data control in a self-sovereign...
Webinar Recording
Supercharge Your Business with Cloud-Based Data Modernization
Mar 06, 2024
Data modernization is critical for businesses to remain competitive in today’s data-driven world, and while the cloud is an important enabler of data modernization, migrating sensitive data to the cloud is challenging. However, it is possible, with the right approach.
Analyst Chat
Analyst Chat #204: Wallets, Decentralized ID, and Trust - Digital Identity Explained
Mar 04, 2024
Matthias and Annie discuss the basics of digital identity and decentralized identity. They explore the concept of a digital identity as an electronic representation of an individual's identity in the digital world. They also discuss the difference between centralized and decentralized identity and the role of governments in providing reliable legal identities. The conversation highlights the need for digital identity in accessing services and the benefits of decentralized identity, such as privacy and portability. The episode concludes with a discussion on the challenges...
Webinar Recording
Cloud Alphabet Soup - CNAPP
Mar 01, 2024
Organizations are using cloud services to develop and deploy new and existing applications. However, the responsibilities for security and compliance are shared between the CSP (Cloud Service Providers) and the cloud customer. The cloud user is responsible for implementing controls to meet their security and compliance obligations.
Analyst Chat
Analyst Chat #203: ChatGPT for Cybersecurity - How Much Can We Trust Generative AI?
Feb 26, 2024
Alexei and Matthias discuss the impact of generative AI on cybersecurity. They explore the shift in public perception towards generative AI and the practical implications for businesses. They highlight the challenges of integrating generative AI into cybersecurity strategies, including data leaks and the need for acceptable use policies. The conversation also covers the use cases of generative AI in cybersecurity, such as research and learning, training, and code generation. The limitations and considerations for security analysts using generative AI tools are discussed,...
Webinar Recording
The Rise of Identity as a Service (IDaaS) as the Cornerstone of Modern Cybersecurity
Feb 23, 2024
Cybersecurity professionals face similar challenges. They must safeguard their organizations against the escalating sophistication of cyber threats and attack vectors, while at the same time administering and securing identities in the context of a dispersed and remote workforce. They strive to strike a balance between stringent security measures and a seamless end-user experience. Furthermore, compliance with regulatory requirements and industry standards for data protection and privacy poses a critical concern, as does the management of identities across an expanding array of applications...
Webinar Recording
Road to EIC: What’s Next in Digital Identity Standards?
Feb 22, 2024
As the digital realm evolves rapidly, the importance of robust and secure identity verification mechanisms becomes paramount. Standards in digital identity help establish secure authentication methods and protocols to safeguard user information by offering frameworks that respect individual privacy rights, while still enabling effective identity verification. In an era dominated by online interactions and transactions, the significance of digital identity standards cannot be overstated. In this “Road to EIC” virtual fireside chat we explore the current state of digital identity standards...
Analyst Chat
Analyst Chat #202: Beyond Traditional Boundaries - Intelligent SIEM solutions
Feb 19, 2024
In this Analyst Chat episode, Matthias and guest Warwick Ashford explore the shift from traditional to next-gen Security Information and Event Management (SIEM) solutions. Highlighting the limitations of traditional SIEM in the face of evolving cyber threats and complex data landscapes, the discussion emphasizes the need for intelligent, automated, and integrated SIEM solutions. The conversation focuses on crucial features for modern Security Operations Centers (SOCs) dealing with high costs, skills shortages, and a surge in security alerts, providing insights into navigating...
Analyst Chat
Analyst Chat #201: Intelligent Defense - Is AI inevitable for Cybersecurity?
Feb 12, 2024
AI is becoming increasingly common and it appears to be unavoidable. However, is this really the case? Marina and Matthias have a conversation about the convergence of AI, machine learning, and cybersecurity. They highlight the importance of utilizing AI to protect our organizations, as attackers are also employing it. Marina explains the primary risks associated with AI in cybersecurity, such as automation mistakes, data security and privacy issues, and excessive dependence on AI. They also explore how defenders can safeguard their organizations from AI-generated threats and stress...
Video
IAM and Cybersecurity Insights and Trends in 2024
Feb 09, 2024
Martin Kuppinger was a virtual guest at SailPoint's SAILforward24 and was invited to have a chat with Matthew Mills about the industry and market, trends and his perspectives. Delve into the future of identity and access management (IAM) as Martin and Matthew discuss the profound impact of AI, decentralized identity, and the regulatory landscape. Gain insights into cybersecurity trends and learn how SailPoint addresses these challenges.
Analyst Chat
Analyst Chat #200: 200 Episodes - A Cyberspace Odyssey
Feb 05, 2024
What a milestone! 200 episodes of the Analyst Chat. Matthias and Martin celebrate the journey of the three years of the podcast. Dive into the evolution of cybersecurity and identity management, industry impact, memorable moments, and key insights. From this episode, we will come back to a weekly schedule, so stay tuned for the episode next Monday.
Webinar Recording
Zero Trust Unveiled: Securing Critical Data in SAP, CAD, and PLM Systems
Feb 02, 2024
In an era of escalating cyber threats, securing critical and commercially sensitive data becomes paramount. Join us for an informative webinar exploring the challenges posed by sophisticated cyber threats and the complexities introduced by the shift to remote working. Discover the heightened risks in sharing and storing SAP, computer-aided design (CAD), and product lifecycle management (PLM) data and learn why zero trust is essential for compliance with regulations like GDPR, NIS2, ISO27001, and CMMC 2.0.
Webinar Recording
The Impact of Expanding Attack Surfaces on Enterprise Cybersecurity and Why You Need a Strong IAM Posture
Jan 31, 2024
Enterprise attack surfaces are constantly evolving and expanding due to the integration of cloud-based infrastructure, interconnected devices, and third-party solutions. New vulnerabilities are skillfully exploited by proactive cybercriminals every day. In this context, a strong Identity and Access Management (IAM) posture is vital to manage risks. However, maintaining this IAM strategy can be a complex task given the multitude of requirements and tools involved.
Webinar Recording
Beyond Secrets Management: Transforming Security in the Digital Age
Jan 26, 2024
In the ever-expanding digital landscape, the proliferation of secrets and cryptographic keys poses a risk and a challenge, with many organizations struggling to maintain control. Relying on secrets management is no longer sufficient. A new comprehensive approach is needed, with more than 40% of data breaches involving stolen credentials. Join security and identity experts from KuppingerCole Analysts and Entrust to reveal the intrinsic and symbiotic relationship between key management and secrets, offering visibility, compliance assurance, and effective risk management. Learn the...
Analyst Chat
Analyst Chat #199: IAM - Orchestration, Convergence, or Both?
Jan 22, 2024
Matthias invited Martin Kuppinger to dissect IAM orchestration and convergence in this episode. Explore their insights on these concepts within identity and access management, from antagonism to coexistence. Stay tuned for upcoming trends and predictions!
Webinar Recording
SAP IDM End of Life: Die IGA-Migration souverän meistern
Jan 19, 2024
Die Abkündigung von SAP Identity Management (SAP IDM) stellt Unternehmen vor eine kritische Herausforderung. Die bisherige Lösung erreicht das Ende ihres Lebenszyklus, und Organisationen müssen sich nun die Frage stellen: Wie kann trotzdem weiterhin Compliance aufrechterhalten werden? Die Gewährleistung der Identitätsverwaltung unter Berücksichtigung der gesetzlichen Bestimmungen entwickelt sich zu einem zentralen Anliegen für Fachleute im Bereich Informationstechnologie. In diesem Kontext suchen Unternehmen nach effektiven Wegen, um die bisherigen Ansätze und Verfahren aus dem SAP...
Video
European Identity and Cloud Awards 2024
Jan 18, 2024
Webinar Recording
Sicherung Ihrer digitalen Grenze: Navigieren durch die sich ständig weiterentwickelnde Bedrohungslandschaft
Jan 17, 2024
In einer Zeit, in der die digitale Transformation die Art und Weise, wie wir Geschäfte machen, revolutioniert, ist die Sicherung der digitalen Grenzen Ihres Unternehmens von größter Bedeutung. Die Bedrohungen entwickeln sich ständig weiter. Nehmen Sie mit Sicherheitsexperten von KuppingerCole Analysts und Palo Alto Networks an einem aufschlussreichen und spannenden Webinar teil, das sich mit der dynamischen Welt des Angriffsflächen- und Bedrohungsmanagements befasst. Sie werden die Herausforderungen erörtern, mit denen Organisationen aller Größenordnungen - von kleinen Unternehmen bis...
Webinar Recording
Securing Your Digital Frontier: Navigating the Ever-Evolving Threat Landscape
Jan 12, 2024
In an era where digital transformation is revolutionizing the way we do business, securing your organization's digital frontier is paramount. Threats are constantly evolving
Video
NIS2: What Everyone Needs to Consider
Jan 11, 2024
The upcoming EU regulation, NIS2, moves closer and organizations will need to act in order to close gaps. Anders Askåsen from Okta and Martin Kuppinger discuss the impact on critical infrastructure organizations and the implications for identity management, particularly in authentication. Learn more about the key considerations, reporting challenges, liability aspects, and the role of identity in meeting NIS2 requirements.
Analyst Chat
Analyst Chat #198: 2023 Wrapped Up - Major Trends in IAM and Cybersecurity
Jan 08, 2024
Join Matthias with Martin Kuppinger and Mike Neuenschwander in this special year-end episode. They reflect on the significant cybersecurity challenges of 2023. The conversation delves into persistent issues, innovations, and an outlook on trends for 2024 in the realms of cybersecurity and identity and access management.