Making Sense of the Top 5 Latest Cybersecurity Trends
- LANGUAGE: English DATE: Thursday, September 27, 2018 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
What’s more important – protecting your systems from ransomware or securing your cloud infrastructure? Should you invest in CEO fraud protection or work harder to prepare for a media fallout after a data breach? Decisions, decisions… Alas, most companies still have pretty limited cybersecurity budgets and simply cannot afford to cover all their grounds sufficiently. Even worse, the dreaded skills gap in IT security is making qualified experts increasingly scarce.
In this webinar, KuppingerCole lead analysts John Tolbert and Alexei Balaganski will talk about the biggest cybersecurity buzzwords to help you separate fact from fiction and make informed decisions about investing in the latest technology trends:
- AI-assisted Incident Management
Machine learning is all the rage in cybersecurity now, but can it really replace a human expert in every case? The quality of every ML-based solution can only be as good as the data used for training and how can we validate that? And who will be responsible for decisions taken by an artificial intelligence?
- Zero Trust approach
Sure, the old “trust but verify” adage is nowadays more popular than ever, but how many CISOs understand the full extent of technological and organizational changes required to pull it off successfully?
- Insider Threat Intelligence
Every business user that has access to sensitive corporate data can, either inadvertently or with a malicious intent, cause substantial damage to your business by leaking confidential information – including your employees, contractors or business partners. Can a network-based UBA solution detect them efficiently or should we look beyond IT infrastructure for the right answers?
- Continuous Authentication
Passwords are dead, biometric methods are easily circumvented, account hijacking is rampant… By combining dynamic context-based authentication with real-time behavior biometrics, the continuous authentication paradigm turns authentication from a single event into a seamless ongoing process and thus promises to reduce the impact of a credential compromise. But does it really solve the problems mentioned above? And what are its privacy implications?
- Embedding a Cybersecurity Culture
Your employees are your company’s most valuable asset and also its greatest security risk. Since C-level executives have replaced system administrators as the most privileged users, hackers are switching to social engineering tactics to make their victims do their job for them. How to make everyone in your company follow the basic cyber hygiene principles? Can technology alone help?
These trends along with many other cybersecurity developments will be extensively covered at the upcoming Cybersecurity Leadership Summits. These summits represent the new thinking that really matters for a secure digital transformation of your enterprise.
We hope to see you in Berlin, Germany this November
PAM (Privileged Access Management) has grown over these years to become a crucial set of technologies that addresses some urgent cybersecurity issues today.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 14-17, 2019, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.