Assess, Evaluate and Secure Your Enterprise Cybersecurity
- LANGUAGE: English DATE: Tuesday, November 12, 2019 TIME: 18:30-22:00
Topics of the Evening:
#1 Measuring & Benchmarking of Cybersecurity landscape in your company
The most important step in checking the own cybersecurity maturity is to understand one' s own landscape, evaluate the existing components to their full extent and uncover possible gaps. KuppingerCole's standardized methodology provides a process that allows a company to evaluate the current situation and compare it with other companies. Christopher Schütze will explain this methodology in his presentation, so that professionals can understand and evaluate the maturity level of their own cybersecurity.
#2 How to minimize the number of species and animals in your zoo of IT Security tools so that there is enough food (budget) for all, without paying by risks
Do you also have the impression that you are running far too many security tools? Are you pressed by the license cost for all these tools? Do you lack skills in your team to run all these teams properly? Do you still feel that your IT is at risk, despite all the tools you have in place? It is rather common that businesses have more tools for IT Security than they can efficiently handle. In his talk, Martin Kuppinger will look at methods that help organizations in analyzing which tools they need and where they are facing remaining gaps. It is not about having all species in the zoo of IT Security tools, but a well-thought-out selection that is targeted on mitigating the severe security risks.
#3 Zero Trust - is Google‘ BeyondCorp a real option for real businesses?
For some time now, the issue of trusting no one, not even your own devices, has been an increasingly popular computer security concept. In terms of your own company, there are many questions to which Google, among others, has a supposed answer with its implementation BeyondCorp. John Tolbert takes up these questions in his lecture and looks to what extent BeyondCorp can make sense as a possible implementation for a non-digital company, or what one can basically learn from it for oneself.
Location / Hotels
- Contact person:
Ms. Lauren Zuber
+49 211 23707725
- Nov 12, 2019 18:30-22:00 Berlin
Endpoint detection and response (EDR) solutions monitor endpoint and network events and record the information in a central database. There, the information is subjected to further analysis, detection, investigation, reporting, and alerting. While EDR solutions may be a good start to protect endpoints, they are by no means sufficient. Instead, Endpoint Privilege Management (EPM) solutions must be integrated to protect the systems from within.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.