Insights

Artificial Intelligence

Recent improvements in computing capabilities mean that machines or systems are now able to complete tasks they have been trained to do in a semi-autonomous way. AI can handle huge volumes of data to produce insights, recommendations, and forecasts; it can save time through automation to complete tasks quickly and accurately; it has the potential to create new revenue streams; and it can be applied in a variety of ways across a range of industries. 

Guide
Guide
Securing Artificial Intelligence – The Impact of AI on Businesses
Learn all about Artificial Intelligence in cybersecurity. Understand the basics and the potential impact on your business.
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
AI Regulation: Challenges and Opportunities
The US and EU share the common goal of ensuring safe and democratic AI, fostering the potential for aligned transatlantic regulatory approaches. The EU-US Trade and Technology Council demonstrates...
Learn more
Leadership Compass
Leadership Compass
Data Quality and Integration Solutions
This report provides an overview of the market for Data Quality and Data Integration solutions that help in gathering, integrating, cleansing, improving, and enriching data across the complete...
Learn more
Event Recording
Event Recording
Enabling Digital Identity Ecosystems
Learn more
The SSI movement: developments and status quo
Event Recording
The SSI movement: developments and status quo
At first, some insights into the background, purpose and history of the e-IDAS regulation are provided and the difference between the previous and the currently proposed e-IDAS version are...
The Digital Identity Wallet - A user perspective
Event Recording
The Digital Identity Wallet - A user perspective
The promise of the DIW (Digital Identity Wallet), which is inspired by SSI (Self-Sovereign Identity), is to give the user more control of which data they are sharing with whom. But do the users...
Panel | AI in Cybersecurity
Event Recording
Panel | AI in Cybersecurity
Tomorrow is already here: AI driven Identity Governance at your fingertips
Event Recording
Tomorrow is already here: AI driven Identity Governance at your fingertips
Anomaly & outlier detection today is far beyond human capacities. Artificial intelligence has become an important technology in cybersecurity, as algorithms can solve many problems better and...
Secure software engineering: The sleeping giant in the GenAI Era
Event Recording
Secure software engineering: The sleeping giant in the GenAI Era
In the realm of cybersecurity, there's one truth we can't escape: Building secure products from the get-go is the most effective, cost-efficient, and innovative approach to achieving cyber...
Building an AI skills Workforce
Event Recording
Building an AI skills Workforce
In this presentation Paul Fisher connects the dots between Henry Ford, Stanley Kubrick and AI. He explains how AI is useless without good data and good data for cybersecurity can only be prepared...
Artificial Intelligence: A New Tool in the Hacker's Arsenal
Event Recording
Artificial Intelligence: A New Tool in the Hacker's Arsenal
Battling the Bots: Enhancing Web Application Security Through Multi-Dimensional Approaches
Event Recording
Battling the Bots: Enhancing Web Application Security Through Multi-Dimensional Approaches
Automated Threats to web applications are according to the Open Web Applications Project (OWASP) a misuse of their inherent valid functionality by applying automated means. Usually, those...
Panel | AI Unleashed: The Battle of Wits in Cybersecurity - Attackers vs. Defenders
Event Recording
Panel | AI Unleashed: The Battle of Wits in Cybersecurity - Attackers vs. Defenders
Risk assessment the attacker way! How secured are your assets in reality?
Event Recording
Risk assessment the attacker way! How secured are your assets in reality?
Attackers don’t sleep and find new ways to get into a company and move laterally through the environment. This session starts with an overview where we come from and the pure reactive...
Building a successful vulnerability management service concept
Event Recording
Building a successful vulnerability management service concept
Vulnerability Management is more then ever an important building block when it comes to early detection of issues to allow a proactive counter measure. This is only possible if various...
Navigating the Complex Landscape: Challenges in Applying AI for Government Security
Event Recording
Navigating the Complex Landscape: Challenges in Applying AI for Government Security
As governments around the world increasingly turn to artificial intelligence (AI) to enhance their security, a myriad of complex challenges emerge. This presentation delves into the multifaceted...
Previous
1 2 3 4 5 6 7 Next