Foresight Consulting in Cybersecurity
In their constant quest for keeping organizations secure, cybersecurity professionals always need to look into the future in order to assess the likelihood of potential attacks. They need to combine their knowledge of the past and the present with their evaluation of the development of prominent attack vectors and come to a risk assessment for their work in the future. In his discussion with our CEO Berthold Kerl, Jonathan Blanchard Smith, Director and Fellow at SAMI Consulting, suggests that “foresight consulting is explicitly not looking into the crystal ball”. Instead,...
Information and Cyber Warfare: Implications for State Strategies and Cybersecurity
In a recent interview with the Financial Times , EON chief executive Leon Birnbaum expressed frustration with Germany’s cyber protection of critical infrastructures.If a successful serious cyberattack were to occur, he believes his company, which operates Germany’s largest gas and electricity distribution network, would be “on its own”. Operating power grids in nine European countries including Sweden, Hungary and the Czech Republic, EON is “constantly” under attack by cybercriminals, some of which are suspected state-backed actors. Unlike most...
„Cyberkriminalität profitiert von sicheren Häfen“
In einer Welt, die zunehmend von digitalen Technologien geprägt ist, ist die Sicherheit unserer Daten und Systeme von entscheidender Bedeutung. Die Bedrohungen in der Cyberwelt entwickeln sich ständig weiter und die Notwendigkeit einer starken Cybersicherheitsstrategie ist unabdingbar. Im Interview mit Johannes Steger, Chefredakteur des „Tagesspiegel Background Cybersecurity“, sprachen wir über verschiedene Aspekte der Cybersicherheit. Von der geopolitischen Einflussnahme auf die Bedrohungslage bis hin zur Bedeutung von Awareness und Vielfalt in der Branche....
Making Cybersecurity ‘Lagom’
In today's episode of the cyberfiles we talk to Patrick Shirazi, Enterprise Security Architect at Swedbank, who thinks cybersecurity needs to be balanced. In accordance with the Swedish concept of ‘Lagom’, cybersecurity should not be too strict and not too lenient. At cyberevolution, Patrick will give a session entitled " The Human Factor: Why people are the main key to cybersecurity " in which he will present several use cases to demonstrate why it is essential to consider the human factor in any organization’s cyber threat landscape.
Enhancing AI Cybersecurity: A Two-Fold Approach
In today's episode of the cyberfiles we talk to Sray Agarwal, Senior Director at Fractal AI, who says that data in AI models needs to be encrypted in such a way that even very diligent hackers or attackers that breach your security systems have no use of the data. At cyberevolution, Sray will give a keynote entitled " RAI 2.0 in the era of Gen AI - Need for Regulating AI " in which he will discuss ethical frameworks, cybersecurity aspects, and data security of artificial intelligence models. Tune in to his video interview and get a taste of what to expect.
Ransomware Attacks in a Protected Environment
In today's episode of the cyberfiles we talk to Florian Jörgens, Chief Information Security Officer of the Vorwerk Group. Vorwerk is a German industry giant producing a wide range of products from the kitchen appliance Thermomix to robotic vacuum cleaners and more. At cyberevolution, Florian will give a 90-minute workshop entitled  "Hacked! 72 Hours of a CISO's Nightmare"   in which he will highlight the immediate steps and strategies essential to mitigating damage and restoring operations after a successful cyberattack.
Navigating China's Cybersecurity Laws and Their Economic Impact
Today’s guest in the cyberfiles is Mary Kissel, Executive Vice President and Senior Policy Advisor at Stephens Inc., one of the largest privately owned investment banks in the United States. Before her role at Stephens, Mary served as Senior Advisor to Secretary of State Mike Pompeo from October 2018 to January 2021 and she had a long and distinguished career at the Wall Street Journal editorial board. At Stephens, Mary consults international clients on risk management in different market environments. At cyberevolution , Mary will be part of the panel entitled Unmasking the...
Identity as the Most Critical Element of Security
With all of us having multiple identities in today's highly digitized world, it would be difficult to disagree with Hed Kovetz, when he says that identity is "almost the last thing that defines the virtual enterprise". As CEO and Co-Founder of Silverfort, Hed knows a thing or two about managing identities properly and shared some of his thoughts in this Speaker Spotlight. Tune in to today’s episode and don't forget to join Hed's keynote on Day 2 of the European Identity and Cloud Conference 2023 where he will be looking at The Identity Security Blind Spot: MFA for Legacy Systems...
Top 3 EIC Topics Picked by Martin Kuppinger
We sat down with KuppingerCole co-founder and principal analyst Martin Kuppinger to ask him about the top three topics that have gained importance since last year’s European Identity and Cloud Conference. In his view, these are Cloud Infrastructure Entitlement Management (CIEM), Passwordless Authentication, and Decentralized Identity. Tune in to today’s Speaker Spotlight to hear why Martin thinks these three concepts have gained so much importance, and which other topics he believes will be highly relevant at EIC 2023.
Battling Insider Threats with Zero Trust
When the COVID-19 pandemic broke out in 2020, many organizations were forced to digitize at a speed exceeding their security capabilities. Remote work meant that employees accessed company networks from potentially unsafe end devices. Today, many in the e-commerce business work in a hybrid mode – partly from home, partly from the office – and are thus potential insider threats. According to today’s guest in our Speaker Spotlight, Rajan Barara, Director of Product Management for Identity at Entrust, Zero Trust can help mitigate the risk of insider threats. At its core,...
The Disjointed State of CIAM
As conscious consumers, we are all familiar with the different stages of the digital consumer lifecycle from registration and onboarding to authentication, transaction, and sometimes also the deletion of an account. As users we expect a frictionless experience while our data is kept safe. In today’s Speaker Spotlight James Lapalme, Vice President Identity at Entrust, explains why organizations issuing digital identities need to gain a full view of the currently somewhat disjointed landscape of customer identities to be able to offer security and a frictionless user experience at...
The Path of Unifying Identities
Most people in the identity and access management community would agree that digital identities are necessary for successful digitization. Tune in to today's Speaker Spotlight with One Identity's Field Strategist Robert Byrne to learn why it is necessary to unify identities in order to sensibly manage the access that is enabled by these digital identities, whether that is related to the lifecycle, privilege, authentication access management, or even directory security aspects of identity. Don't miss Robert's keynote at this year's European Identity and Cloud Conference 2023 entitled...
1 2 Next