Assess, Evaluate and Secure Your Enterprise Cybersecurity
- LANGUAGE: English DATE: Tuesday, November 12, 2019 TIME: 18:30-22:00
Topics of the Evening:
#1 Measuring & Benchmarking of Cybersecurity landscape in your company
The most important step in checking the own cybersecurity maturity is to understand one' s own landscape, evaluate the existing components to their full extent and uncover possible gaps. KuppingerCole's standardized methodology provides a process that allows a company to evaluate the current situation and compare it with other companies. Christopher Schütze will explain this methodology in his presentation, so that professionals can understand and evaluate the maturity level of their own cybersecurity.
#2 How to minimize the number of species and animals in your zoo of IT Security tools so that there is enough food (budget) for all, without paying by risks
Do you also have the impression that you are running far too many security tools? Are you pressed by the license cost for all these tools? Do you lack skills in your team to run all these teams properly? Do you still feel that your IT is at risk, despite all the tools you have in place? It is rather common that businesses have more tools for IT Security than they can efficiently handle. In his talk, Martin Kuppinger will look at methods that help organizations in analyzing which tools they need and where they are facing remaining gaps. It is not about having all species in the zoo of IT Security tools, but a well-thought-out selection that is targeted on mitigating the severe security risks.
#3 Zero Trust - is Google‘ BeyondCorp a real option for real businesses?
For some time now, the issue of trusting no one, not even your own devices, has been an increasingly popular computer security concept. In terms of your own company, there are many questions to which Google, among others, has a supposed answer with its implementation BeyondCorp. John Tolbert takes up these questions in his lecture and looks to what extent BeyondCorp can make sense as a possible implementation for a non-digital company, or what one can basically learn from it for oneself.
Location / Hotels
- Contact person:
Ms. Lauren Zuber
+49 211 23707725
- Nov 12, 2019 18:30-22:00 Berlin
Privileged Access Management (PAM) solutions are critical cybersecurity controls that address the security risks associated with the use of privileged access in organizations and companies. To reduce the risk of privileged accounts being hijacked or used fraudulently, and to uphold regulatory compliance, a strong PAM solution is essential. But finding the right PAM solution can be challenging.