Partner Details
Silver Sponsor
115 Houndsditch • EC3A 7BR London • United Kingdom
Email: support@duo.com
Internet: https://duo.com/
Duo Security, now part of Cisco, is the leading multi-factor authentication (MFA) and Zero Trust for the Workforce provider. Duo's zero-trust security platform, Duo Beyond, enables organizations to provide secure access to all of their critical applications - for any user, from anywhere, and with any device. Duo is a trusted partner to more than 21,000 customers globally, including Dresser-Rand, Etsy, Facebook, Paramount Pictures, Random House, Zillow and more. Founded in Ann Arbor, Michigan, Duo has offices in growing hubs in Detroit; Austin, Texas; San Francisco, California; and London. Visit Duo.com to find out more
Sponsored Events
Date | Title |
---|---|
Jun 14, 2022 |
Webinar
The Changing Scope of the NIS 2 EU DirectiveThe NIS Directive aimed at achieving a common standard of network and information security across all EU Member States, with a focus on operators of essential services, is scheduled for an update. Suppliers of utilities, healthcare, transport, communications, and other services need to know what changes are coming and what they need to do to comply. |
Apr 07, 2022 |
Webinar
Protecting the Business From Software Supply Chain ThreatsRecent events such as the SolarWinds and Kaseya compromises by malicious actors have demonstrated the need to focus significantly more on software supply chain security. According to a report from ENISA, supply chain attacks are increasing, with 66% of attacks focusing on source code and 62% exploiting customer trust in suppliers. This is a risk organizations can’t afford to ignore. |
Nov 09 ‑ Nov 11, 2021 |
Hybrid Event
Cybersecurity Leadership Summit 2021The Cybersecurity Leadership Summit brings together top security leaders to discuss latest trends and developments in the cyber space. CSLS goes beyond IT troubleshooting and primarily focusses on the managerial aspects of cybersecurity. |
Sep 13 ‑ Sep 16, 2021 |
Hybrid Event
European Identity and Cloud Conference 2021The European Identity and Cloud Conference returns fully digitalized, reacting to the global pandemic. We have collected a lot of experience in virtual conferencing throughout 2020 to be able to offer you a safe and hygienic event experience – on-site, virtual, and hybrid. |
Jul 21, 2021 |
Virtual Event
The Access Management Playbook: Securing Today's OrganizationsManaging the granting and revoking of access based on user workflows is paramount to enabling effective risk management. Enforcing distinct access control requires an interconnected access management system that aligns with company policies and regulations. |
Jul 06, 2021 |
Webinar
The Path to Going PasswordlessPassword-based authentication is no longer fit for purpose. Passwords are costly and difficult to manage, they result in poor user experiences, and they are easily compromised. This has been widely recognized for some time, but going passwordless is also challenging and continues to be elusive for many organizations. |
May 27, 2021 |
Virtual Event
Enabling the Future of Identity and Access ManagementJoin the KCLive Event on the future of identity and access management to learn how to implement an interconnected IAM architecture designed for the post-pandemic era. |
Mar 18, 2021 |
Webinar
Maturing a Zero-Trust Strategy for the Extended EnterpriseIn the digital era, a 20th century perimeter-based approach to security is no longer appropriate or effective in securing the modern extended enterprise. Instead, a more flexible, identity-based approach is required that can be implemented at every layer of IT, from devices and networks to applications and data. |
Dec 01, 2020 |
Webinar
Zero Trust for the WorkforceWhile the concept of zero-trust networking is nearly a decade old, the last few years have seen its popularity in industry discussions grow exponentially. |
Nov 17 ‑ Nov 18, 2020 |
Virtual Event
Cyber Access Summit 2020Willkommen zum Cyber Access Summit (CAS) 2020! Gestalten Sie die Zukunft der digitalen Transformation und diskutieren Sie mit Kollegen und Branchenexperten. Das Programm des deutschsprachigen Cyber Access Summit 2020 nimmt aktuelle Themen und Trends im Bereich des Identity und Access Managements in den Fokus. |
Nov 09 ‑ Nov 11, 2020 |
Virtual Event
Cybersecurity Leadership Summit 2020In order to follow the footsteps of digital and technological advancements, have yourself prepared for the future and gain critical knowledge on emerging trends, KuppingerCole Analysts holds its second Cybersecurity Leadership Summit (#CSLS20) virtually, offering the remarkable world-class keynote speakers, panelists, moderators, and professionals. It is the unique opportunity to meet the peers concerned with the same issues and discuss actual topics ranging from the role of Artificial Intelligence in Cybersecurity, to Strong Authentication solutions, Privileged Access Management, Data Security and Social Engineering threats. |
Sep 10, 2020 |
Webinar
Die Demokratisierung der CybersicherheitIm Laufe der vergangenen Jahrzehnte haben Unternehmen vielen Anstrengungen auf sich genommen, um ihre IT-Sicherheit zu verbessern und so ihre Daten und Netzwerke zu schützen. Eine Konsequenz daraus wird immer deutlicher sichtbar: CISOs und ihre Teams müssen sich um eine (zu) große Zahl an Produkten und Lösungen kümmern, die der Unternehmenssicherheit dienen sollen. Oft sorgt schon die schiere Masse an Lösungen für eine hohe Komplexität und jährlich steigende Gesamtbetriebskosten (TCO), wobei der Mehrwert für die Sicherheit durch eine immer höhere Zahl an Tools fraglich ist. |
Jul 28, 2020 |
Webinar
We Need to Talk About Passwords – Urgently!Passwords have been used for authentication for decades and continue to proliferate. Yet we know they create friction for users, slow down business productivity, and are a weak form of user authentication. Users are always forgetting them or use weak passwords that are easily cracked by hackers. Many organizations would love to lessen reliance on passwords but many passwordless solutions only provide a partial solution and do not solve the inherent weakness of passwords. Modern enterprises cannot cover the myriad of access use cases today with a passwordless solution alone. |
May 12 ‑ May 15, 2020 |
Congress
European Identity & Cloud Conference 2020Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers. |
Videos
Date | Language | Title |
---|---|---|
Jun 15, 2022 |
![]() |
The Changing Scope of the NIS 2 EU DirectiveThe NIS Directive aimed at achieving a common standard of network and information security across all EU Member States, with a focus on operators of essential services, is scheduled for an update. Suppliers of utilities, healthcare, transport, communications, and other services need to know what ... |
Apr 08, 2022 |
![]() |
Protecting the Business From Software Supply Chain ThreatsRecent events such as the SolarWinds and Kaseya compromises by malicious actors have demonstrated the need to focus significantly more on software supply chain security. According to a report from ENISA, supply chain attacks are increasing, with 66% of attacks focusing on source code and 62% expl... |
Jul 22, 2021 |
![]() |
The Path To Going Passwordless |
Jul 22, 2021 |
![]() |
Expert Chat: Interview with Josh Green |
Jul 07, 2021 |
![]() |
The Path to Going PasswordlessPassword-based authentication is no longer fit for purpose. Passwords are costly and difficult to manage, they result in poor user experiences, and they are easily compromised. This has been widely recognized for some time, but going passwordless is also challenging and continues to be elusive fo... |
May 27, 2021 |
![]() |
Panel - What's Next for IAM: Building for the Future |
Mar 19, 2021 |
![]() |
Maturing a Zero-Trust Strategy for the Extended EnterpriseIn the digital era, a 20th century perimeter-based approach to security is no longer appropriate or effective in securing the modern extended enterprise. Instead, a more flexible, identity-based approach is required that can be implemented at every layer of IT, from devices and networks to applic... |
Dec 02, 2020 |
![]() |
Zero Trust for the WorkforceWhile the concept of zero-trust networking is nearly a decade old, the last few years have seen its popularity in industry discussions grow exponentially. |
Nov 20, 2020 |
![]() |
Bjoern Wuscher, Athena Brown: Zero Trust beginnt mit MFABei Cisco Duo Security beginnt der Weg zu Zero Trust mit der Multi-Faktor Authentifizierung (MFA). Heutzutage müssen Unternehmen eine mobile Belegschaft sichern, die Unternehmensgeräte, aber auch ihre persönlichen Geräte verwendet, um auf Unternehmensanwendungen zuzugreifen. Duo bietet der Belegschaft "Zero-Trust" durch MFA, Tools für adaptive Zugriffsrichtlinien und Gerätevertrauen. In dieser Keynote erfahren Sie, ob der „Zero Trust“ -Ansatz für Ihre IT-Sicherheit geeignet ist und wie Sie diese Reise beginnen können. Folgendes werden Sie lernen: Warum ist Zero Trust wichtig und wie gehe ich programmatisch vor? Welche Lehren haben wir aus früheren Erfahrungen gezogen? Was sind die ersten Schritte zur Implementierung von Zero Trust? Vor welchen möglichen Herausforderungen und Hindernissen werde ich stehen? |
Sep 11, 2020 |
![]() |
Die Demokratisierung der CybersicherheitIm Laufe der vergangenen Jahrzehnte haben Unternehmen vielen Anstrengungen auf sich genommen, um ihre IT-Sicherheit zu verbessern und so ihre Daten und Netzwerke zu schützen. Eine Konsequenz daraus wird immer deutlicher sichtbar: CISOs und ihre Teams müssen sich um eine (zu) große Zahl an Produkt... |
Jul 29, 2020 |
![]() |
We Need to Talk About Passwords – Urgently!Passwords have been used for authentication for decades and continue to proliferate. Yet we know they create friction for users, slow down business productivity, and are a weak form of user authentication. Users are always forgetting them or use weak passwords that are easily cracked by hackers. ... |
Become a Sponsor
Enabling the Future of Identity and Access Management
- Language:
- English
- Contact person:
-
Mr. Levent Kara
lk@kuppingercole.com
- May 27, 2021 2:00 PM - 6:00 PM CET
How can we help you