Assess, Evaluate and Secure Your Enterprise Cybersecurity
- LANGUAGE: English DATE: Tuesday, November 12, 2019 TIME: 18:30-22:00
Topics of the Evening:
#1 Measuring & Benchmarking of Cybersecurity landscape in your company
The most important step in checking the own cybersecurity maturity is to understand one' s own landscape, evaluate the existing components to their full extent and uncover possible gaps. KuppingerCole's standardized methodology provides a process that allows a company to evaluate the current situation and compare it with other companies. Christopher Schütze will explain this methodology in his presentation, so that professionals can understand and evaluate the maturity level of their own cybersecurity.
#2 How to minimize the number of species and animals in your zoo of IT Security tools so that there is enough food (budget) for all, without paying by risks
Do you also have the impression that you are running far too many security tools? Are you pressed by the license cost for all these tools? Do you lack skills in your team to run all these teams properly? Do you still feel that your IT is at risk, despite all the tools you have in place? It is rather common that businesses have more tools for IT Security than they can efficiently handle. In his talk, Martin Kuppinger will look at methods that help organizations in analyzing which tools they need and where they are facing remaining gaps. It is not about having all species in the zoo of IT Security tools, but a well-thought-out selection that is targeted on mitigating the severe security risks.
#3 Zero Trust - is Google‘ BeyondCorp a real option for real businesses?
For some time now, the issue of trusting no one, not even your own devices, has been an increasingly popular computer security concept. In terms of your own company, there are many questions to which Google, among others, has a supposed answer with its implementation BeyondCorp. John Tolbert takes up these questions in his lecture and looks to what extent BeyondCorp can make sense as a possible implementation for a non-digital company, or what one can basically learn from it for oneself.
Location / Hotels
- Contact person:
Ms. Lauren Zuber
+49 211 23707725
- Nov 12, 2019 18:30-22:00 Berlin
When it comes to identity management many companies depend heavily on Microsoft Active Directory (AD). This high degree of dependency on one service can become a problem when this service faces an outage. Also, respective of the requirements companies have, all services have certain limitations which are sometimes necessary to overcome. Many cyberattacks are perpetrated via staff endpoint devices (computers, smartphones or even printers). This necessitates a fine-mesh risk management approach with a centralized solution, called Identity Fabric at KuppingerCole.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from September 13 - 16, 2021, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 1000 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.