Early-bird Discount
expires in
Register Now


cyberevolution 2023 Blog

Read the latest news and updates

The Bletchley Declaration: The Imitation Game of a Different Kind
Last week, the United Kingdom hosted the AI Safety Summit, the first ever international conference on the safety and regulation of artificial intelligence. With attendees from over 30 governments and international organizations, it represented the beginning of long-term international cooperation on AI safety, with the next summit already planned in 2024 in France.
Alexei Balaganski
Nov 08, 2023
Foresight Consulting in Cybersecurity
Cybersecurity professionals sometimes must predict the future to be able to know what to do in the present. With SAFIRE scenarios they can get a real edge over cyber criminals.
Marius Goeddert
Nov 07, 2023
The Human Vector
Every cybersecurity professional who has used ChatGPT or any other GPT has had one of the four impulses our guest author Jürgen Schulze discusses in this blog.
Nov 03, 2023
Information and Cyber Warfare: Implications for State Strategies and Cybersecurity
Join Alexander Klimburg, Senior Fellow at the Hague Center for Strategic Studies and former Head of the Center for Cybersecurity at the World Economic Forum, as he discusses the concepts of information and cyber warfare, as well as the implications for CISOs and board dynamics.
Marius Goeddert
Oct 24, 2023
Cyberkriminalität profitiert von sicheren Häfen
Cyberkriminelle nutzen Desinformationskampagnen, um Informationssicherheitssysteme auszuhöhlen. Unser Gespräch mit dem Chefredakteur des Tagesspiegel Background Cybersecurity beleuchtet, wie der Blick aufs große Ganze gewährleistet werden kann.
Marius Goeddert
Oct 18, 2023
Cloud Security Alphabet Soup
Is securing your cloud security different from securing other forms of IT? You would think so from the alphabet soup of acronyms around the subject.
Mike Small
Oct 10, 2023
Making Cybersecurity ‘Lagom’
Join Swedbank’s Patrick Shirazi when he discusses the human role in cybersecurity and what cybersecurity experts can learn from the Swedish concept of Lagom.
Marius Goeddert
Sep 26, 2023
Enhancing AI Cybersecurity: A Two-Fold Approach
Tune in to Sray Agarwal, Senior Director at Fractal AI discussing ethical frameworks, cybersecurity aspects, and data security of artificial intelligence models.
Marius Goeddert
Sep 20, 2023
A Secure Supply Chain is Impossible. Here is why.
Cyberattacks in the global supply chain are the new wild frontier. Many will feature theft of credentials, later used for major attacks including ransomware on much larger partner companies. But the nature of supply chains means they can never be 100% secure, but we can do better if we stick together.
Paul Fisher
Sep 19, 2023
Ransomware Attacks in a Protected Environment
Tune in to Florian Jörgens, CISO at Vorwerk discussing ransomware attacks and why networking is important to counter it.
Marius Goeddert
Sep 15, 2023
Tech vs. Law: A Dialectical Approach to Balancing Innovation and Regulation
The complex relationship between law and technology presents a world of possibilities. While some may view law as a constraint on innovation, it serves a crucial role in safeguarding public welfare and ensuring accountability. Engaging discussions on this dynamic intersection create a space for diverse voices and foster fruitful collaborations among stakeholders.
Alejandro Leal
Sep 12, 2023
Navigating China's Cybersecurity Laws and Their Economic Impact
Tune in to Mary Kissel, Executive Vice President and Senior Policy Advisor at Stephens Inc. discussing the business and cyber risks emanating from the Chinese market.
Marius Goeddert
Sep 07, 2023
Who is Responsible for Operational Technology Security?
We recommend that all organizations that have Operational Technology (OT) consolidate the security functions and management under the enterprise CISO. Though most organizations with OT are not aligned that way today, we predict that by 2025 more than 60% will have more centralized security control over both types of environments.
John Tolbert
Sep 05, 2023
Securing Tomorrow: Quantum Computing Horizons in Cybersecurity
Dive into the enigmatic realm of quantum computing, where advanced technology parallels magic. While space exploration and AI seamlessly integrate into daily life, quantum computing remains a captivating mystery. Quantum computers won't replace classical ones; instead, they birth novel algorithms for once-insolvable problems. The blog outlines challenges in constructing and expanding quantum computers due to their fragility and noise.
Alexei Balaganski
Aug 24, 2023
Beyond Boundaries: The Geopolitics of Cyberspace
The concept of sovereignty serves as the foundation for various rules and principles of international law and is considered to be the cornerstone of international law. The modern conception of the state is characterized by notions of territory as fixed boundaries, under the power and rule of specific states, and protected by international laws which legitimize the state as territorially fixed. Thus, sovereignty and the international legal personality of states are inextricably linked.
Alejandro Leal
Aug 15, 2023
Securing the Digital Universe: Where Do We Even Start?
What a huge topic. The Digital Universe. Is this more than the Metaverse or less? Anyway: We live in the Digital Age. The vast majority of organizations rely on digital services to run at least parts of their business. Every one of us is consuming such digital services. They are ubiquitous. But this bigger ecosystem of connected digital services, of consumers and customers and citizens, of businesses and governments, of business partners and suppliers, of devices and things is at risk.
Martin Kuppinger
Aug 08, 2023
Securing the Autonomous World by Reinforcing Cybersecurity
Automation powered by artificial intelligence and machine learning has grown exponentially in the past few years. Companies are leveraging the benefits of automating to simplify complex and redundant tasks and optimize efficiency. Automation is also becoming a key player in cybersecurity for threat detection, incident response, and vulnerability management in real-time.
Nitish Deshpande
Aug 01, 2023
Future Cybersecurity Threats: Advanced Disinformation Campaigns
Cyberspace greatly enhances an actor's ability to engage in activities that can yield geopolitical and economic gains without resorting to the use of force. With the advent of cyberspace, various actors, including both state and non-state entities, have taken advantage of its vast interconnectedness to partake in a wide range of activities, including malicious behavior.
Alejandro Leal
Jul 21, 2023
Future Cybersecurity Threats: Be Prepared
Preparing for future cybersecurity threats can be daunting, but it really doesn’t have to be the case if cyber security leaders recognize the true nature of the challenge. An analysis of past cyber-attacks reveals that they tend to be cyclic and lack any real innovation.
Warwick Ashford
Jul 18, 2023
The Rise of AI Is Revolutionizing Cyber-Attacks
Artificial Intelligence (AI) has been a revolutionary force in several fields, transforming industries and increasing efficiency. Its impact, however, is not restricted to good applications. AI has also found its way into the hands of cyber attackers, allowing them to exploit weaknesses, launch targeted attacks, and evade traditional security measures more effectively. Certainly, AI can help attackers just as easily as it can help defenders.
Marina Iantorno
Jul 11, 2023
Inside cyberevolution: What to Expect at KuppingerCole's New Conference
Join KuppingerCole CEO Berthold Kerl to find out what cyberevolution is all about and why you should join.
Berthold Kerl
Jul 06, 2023
AI and Cybersecurity: A New Hope for Cyber Defenders?
Statistics from around the world clearly show that data breaches, ransomware attacks, and other cyberthreats are on the rise. Everyone has high hopes for Artificial Intelligence (AI) technologies that promise to reshape the cybersecurity and finally tip the scale in favor of cyber defenders.
Alexei Balaganski
Jul 04, 2023
The Triple Threat: AI Ethics, Bias, and Deepfakes in Cybersecurity
Artificial intelligence has radically transformed the field of cybersecurity. Although it is considered a game changer, the adoption of AI presents significant ethical challenges, bias, and the growing risk of deepfakes.
Marina Iantorno
Jun 29, 2023
Almost Ready to Join the cyberevolution 2023?
Reach out to our team with any remaining questions
Get in touch