Blog
Facebook Twitter LinkedIn

Blog

Blog Post  Dec 06, 2022
CSLS 2022 Is a Wrap
Cybersecurity Leadership Summit 2022 was a great success. Thank you to everyone who made it happen.
Blog Post  Oct 31, 2022
Preventing Supply Chain Attacks
Supply chain attacks have become a major concern for every kind of organization. Which role does Governance, Risk, and Compliance (GRC) play in all this and what does the future hold for enterprises?
Blog Post  Oct 26, 2022
What We Can Learn from DeFi and Crypto Exchange Attacks
Attacks on DeFi platforms occur often enough to show that proper cyber hygiene is necessary no matter how cutting edge the technology is.
Blog Post  Oct 19, 2022
Do You Really Need a VPN?
Nothing is as misunderstood as a VPN. Some providers claim that their VPN makes browsing safer and improves privacy. Is that really the case, or could it make things worse? Read now and find out!
Blog Post  Oct 17, 2022
The Importance of SME’s Cybersecurity
Security controls are diverse and complex. Every organization faces dynamic and relentless attackers every day. Watch now and find out what insights Andrzej Kawalec provides that can make a CISO's life easier.
Blog Post  Oct 13, 2022
Is It Possible to Recover After a Cyberattack?
Unfortunately, every organization is vulnerable to suffer a cyberattack. We have seen in the last years a considerable increase in cybercrime and the negative impact that it causes on businesses. The obvious consequences are financial, but that is just the tip of the iceberg. Read now!
Blog Post  Oct 10, 2022
Cyber-Crisis Becomes an Opportunity for Insurers
The pandemic changed our lives in many ways, some good and some bad. However, one impact has been that that cyber-attacks are more prevalent than ever before. This problem comes with opportunities. Read now to find out more!
Blog Post  Oct 10, 2022
Martin Kuppinger's Must Watch Sessions
Read now to find out what Martin Kuppinger's must watch sessions are, you should attend!
Blog Post  Oct 05, 2022
Training Non-techies on Cybersecurity Awareness
Everyone is at risk of cyberattacks every day. That's why it's a CISO's job to help colleges that aren't as familiar with the topic. Learn how to do it right, read now!
Blog Post  Oct 04, 2022
Countering State-Sponsored Cyber Attacks
Nordea CSO Marc Hofmann explains the significance of state actors in today's cyber threatscape and what organizations can do to protect themselves.
Blog Post  Sep 26, 2022
Cyber Hygiene: Common Problems & Best Practices
Adopting a cyber hygiene strategy is a lot like developing new habits to work more safely. Similar to personal habits, organizations also have a culture. Cyber hygiene routines must be a shared responsibility involving all departments and users.
Blog Post  Sep 25, 2022
Defining Modern Cybersecurity Leadership
In this episode of the Analyst Chat, Matthias talks to KuppingerCole CEO Berthold Kerl about cybersecurity leadership and what it takes to lead a company in cybersecurity.
Blog Post  Sep 19, 2022
Ransomware: The Invisible Enemy of Organizations
The cost of cyberattacks is tremendous and affects every business and government around the world. So how can you become more resilient? Read on to find out.
Blog Post  Sep 16, 2022
Raising User Awareness to Increase Cyber Resilience
How can you mitigate risk in the age of socially engineered cyberattacks? Watch now and find out.
Blog Post  Sep 13, 2022
Who is Afraid of Security Automation?
Understanding security automation is becoming increasingly important as security experts become rarer. Read now!
Blog Post  Sep 12, 2022
The Importance of Standards in the IT Security Industry
Tune in to learn more about the importance of standards in cybersecurity
Blog Post  Sep 05, 2022
Security for Operational Technology Environments
Learn now about the similar and unique threats facing operational technology (OT) compared to traditional enterprise IT systems.
Blog Post  Aug 29, 2022
You Cannot Buy Zero Trust, But That’s Actually OK
Zero Trust is undoubtedly one of the hottest buzzwords in the IT industry. Unfortunately, even the companies highly motivated to adopt Zero Trust as their new strategy are often struggling even with the initial steps. Read now to learn more.
Blog Post  Aug 22, 2022
How Does Using Cloud Services Alter Risk
I am often asked “does using a cloud service alter risk?” I always reply to this question with “well it depends”. Every organization has its own set of circumstances, and the answer needs to take these into account. It is also important to think about how the responsibility for security is shared be
Blog Post  Aug 14, 2022
Human Factor in Cybersecurity: The Weakest Link?
The Human Factor Cybercriminals often exploit our human vulnerabilities and psychological elements to steal credentials and gain unauthorized access. Since phishing and social engineering attacks are primarily targeted at people, the human factor continues to be an important element CISOs need...
Blog Post  Jul 28, 2022
The 3 Essentials of a Cyber Leader
How can the Cybersecurity Leadership Summit help you become a great digital leader? Raj Hegde, Product Manager, tells us what the 3 core qualities of the digital leaders of the future are, and how you can strengthen them by joining us on 8-10 November in Berlin.
Blog Post  Jul 25, 2022
Speaking in Cybersecurity: My Recollection!
During my studies and the subsequent first years of my career, I was already always someone who liked to share knowledge with others and present interesting topics. This is not the only reason why my profession has developed in the direction of IT consulting. In fact, in consulting, "being on...

Tickets

On-Demand Access
Re-live CSLS 2022
€100
 
Watch more than 90 sessions on-demand
Download all available presentations
Subscribe for updates
Please provide your email address