Back to Congress
Latest Sponsored Events
Related Videos
Webinar Recording
Jun 15, 2022
The Changing Scope of the NIS 2 EU Directive

The NIS Directive aimed at achieving a common standard of network and information security across all EU Member States, with a focus on operators of essential services, is scheduled for an update. Suppliers of utilities, healthcare, transport, communications, and other services need to know what changes are coming and what they need to do to comply.

Since the NIS Directive was adopted in 2016, network and information systems have developed into a central feature of everyday life, driven by digital transformation. This has led to an expansion of the cybersecurity attack surface. In response to these challenges, the proposed NIS 2 Directive repeals and builds on the existing NIS directive.

Join this session with two spokespeople from Duo Security, part of Cisco Secure: Advisory CISO Richard Archdeacon, and Head of Solution Engineering, Andy Mayle, and Mike Small, Senior Analyst at KuppingerCole for a discussion about what changes are coming, why they are being introduced, and how the scope is widening.

Webinar Recording
Apr 08, 2022
Protecting the Business From Software Supply Chain Threats

Recent events such as the SolarWinds and Kaseya compromises by malicious actors have demonstrated the need to focus significantly more on software supply chain security. According to a report from ENISA, supply chain attacks are increasing, with 66% of attacks focusing on source code and 62% exploiting customer trust in suppliers. This is a risk organizations can’t afford to ignore.

Event Recording
Jul 22, 2021
The Path To Going Passwordless
Event Recording
Jul 22, 2021
Expert Chat: Interview with Josh Green
Webinar Recording
Jul 07, 2021
The Path to Going Passwordless

Password-based authentication is no longer fit for purpose. Passwords are costly and difficult to manage, they result in poor user experiences, and they are easily compromised. This has been widely recognized for some time, but going passwordless is also challenging and continues to be elusive for many organizations.

Event Recording
May 27, 2021
Panel - What's Next for IAM: Building for the Future
Webinar Recording
Mar 19, 2021
Maturing a Zero-Trust Strategy for the Extended Enterprise

In the digital era, a 20th century perimeter-based approach to security is no longer appropriate or effective in securing the modern extended enterprise. Instead, a more flexible, identity-based approach is required that can be implemented at every layer of IT, from devices and networks to applications and data.

Webinar Recording
Dec 02, 2020
Zero Trust for the Workforce

While the concept of zero-trust networking is nearly a decade old, the last few years have seen its popularity in industry discussions grow exponentially.

Event Recording
Nov 20, 2020
Bjoern Wuscher, Athena Brown: Zero Trust beginnt mit MFA

Bei Cisco Duo Security beginnt der Weg zu Zero Trust mit der Multi-Faktor Authentifizierung (MFA). Heutzutage müssen Unternehmen eine mobile Belegschaft sichern, die Unternehmensgeräte, aber auch ihre persönlichen Geräte verwendet, um auf Unternehmensanwendungen zuzugreifen. Duo bietet der Belegschaft "Zero-Trust" durch MFA, Tools für adaptive Zugriffsrichtlinien und Gerätevertrauen.

In dieser Keynote erfahren Sie, ob der „Zero Trust“ -Ansatz für Ihre IT-Sicherheit geeignet ist und wie Sie diese Reise beginnen können.

 

Folgendes werden Sie lernen:

Warum ist Zero Trust wichtig und wie gehe ich programmatisch vor?

Welche Lehren haben wir aus früheren Erfahrungen gezogen?

Was sind die ersten Schritte zur Implementierung von Zero Trust?

Vor welchen möglichen Herausforderungen und Hindernissen werde ich stehen?

Webinar Recording
Sep 11, 2020
Die Demokratisierung der Cybersicherheit

Im Laufe der vergangenen Jahrzehnte haben Unternehmen vielen Anstrengungen auf sich genommen, um ihre IT-Sicherheit zu verbessern und so ihre Daten und Netzwerke zu schützen. Eine Konsequenz daraus wird immer deutlicher sichtbar: CISOs und ihre Teams müssen sich um eine (zu) große Zahl an Produkten und Lösungen kümmern, die der Unternehmenssicherheit dienen sollen. Oft sorgt schon die schiere Masse an Lösungen für eine hohe Komplexität und jährlich steigende Gesamtbetriebskosten (TCO), wobei der Mehrwert für die Sicherheit durch eine immer höhere Zahl an Tools fraglich ist.

Webinar Recording
Jul 29, 2020
We Need to Talk About Passwords – Urgently!

Passwords have been used for authentication for decades and continue to proliferate. Yet we know they create friction for users, slow down business productivity, and are a weak form of user authentication. Users are always forgetting them or use weak passwords that are easily cracked by hackers. Many organizations would love to lessen reliance on passwords but many passwordless solutions only provide a partial solution and do not solve the inherent weakness of passwords. Modern enterprises cannot cover the myriad of access use cases today with a passwordless solution alone.