Making Sense of the Top 5 Latest Cybersecurity Trends
- LANGUAGE: English DATE: Thursday, September 27, 2018 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Let’s face it: with each passing year, the CISO’s job is not becoming any easier. As companies continue embracing the Digital Transformation, the growing complexity and openness of their IT infrastructures mean that the attack surface for hackers and malicious insiders is increasing as well. Combined with the recent political developments such as the rise of state-sponsored attacks, new surveillance laws, and harsh privacy regulations, security professionals now have way too many things on their hands that sometimes keep them awake at night.
What’s more important – protecting your systems from ransomware or securing your cloud infrastructure? Should you invest in CEO fraud protection or work harder to prepare for a media fallout after a data breach? Decisions, decisions… Alas, most companies still have pretty limited cybersecurity budgets and simply cannot afford to cover all their grounds sufficiently. Even worse, the dreaded skills gap in IT security is making qualified experts increasingly scarce.
In this webinar, KuppingerCole lead analysts John Tolbert and Alexei Balaganski will talk about the biggest cybersecurity buzzwords to help you separate fact from fiction and make informed decisions about investing in the latest technology trends:
- AI-assisted Incident Management
Machine learning is all the rage in cybersecurity now, but can it really replace a human expert in every case? The quality of every ML-based solution can only be as good as the data used for training and how can we validate that? And who will be responsible for decisions taken by an artificial intelligence?
- Zero Trust approach
Sure, the old “trust but verify” adage is nowadays more popular than ever, but how many CISOs understand the full extent of technological and organizational changes required to pull it off successfully?
- Insider Threat Intelligence
Every business user that has access to sensitive corporate data can, either inadvertently or with a malicious intent, cause substantial damage to your business by leaking confidential information – including your employees, contractors or business partners. Can a network-based UBA solution detect them efficiently or should we look beyond IT infrastructure for the right answers?
- Continuous Authentication
Passwords are dead, biometric methods are easily circumvented, account hijacking is rampant… By combining dynamic context-based authentication with real-time behavior biometrics, the continuous authentication paradigm turns authentication from a single event into a seamless ongoing process and thus promises to reduce the impact of a credential compromise. But does it really solve the problems mentioned above? And what are its privacy implications?
- Embedding a Cybersecurity Culture
Your employees are your company’s most valuable asset and also its greatest security risk. Since C-level executives have replaced system administrators as the most privileged users, hackers are switching to social engineering tactics to make their victims do their job for them. How to make everyone in your company follow the basic cyber hygiene principles? Can technology alone help?
These trends along with many other cybersecurity developments will be extensively covered at the upcoming Cybersecurity Leadership Summits. These summits represent the new thinking that really matters for a secure digital transformation of your enterprise.
We hope to see you in Berlin, Germany this November
The Identity-as-a-Service (IDaaS) market continues to develop with a significant push from organizations looking to adopt cloud-based delivery of security services including IAM. While IDaaS Access Management solutions, providing SSO (Single Sign-On) for the users and access to a variety of services are already established, IDaaS IGA is not as widely used yet. However, shifting IGA (Identity Governance and Administration) capabilities, e.g. Identity Lifecycle Management and Access Governance, to the cloud might provide significant benefits regarding time and cost of deploying and operating IGA.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.