Insights

Business Resilience

Business Resilience is the ability to adapt quickly to risks and disruptions, while maintaining key business workflows and safeguarding employees, assets, and brand reputation. Business Resilience Management is key to business survival in the face of rapidly changing IT, cyber threat, and regulatory environments.

Guide
Guide
Business Resilience: A Strategic Approach to Business Continuity
Business Resilience Management is key to business survival in the face of rapidly changing IT, cyber threat, and regulatory environments.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Master Class
Master Class
Business Resilience Management in a Pandemic Crisis 
Attend this KC Master Class to learn what actions you can take immediately to handle the current pandemic crisis. In a second stage, an in-depth course will help you bolster your business...
Learn more
Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
Zero Trust: CISOs No Longer Need to Choose Between Usability and Security
Among the longstanding challenges that information security leaders have grappled with for years, one stands out: the difficulty of balancing user experience and security. The traditional...
Learn more
Advisory Note
Advisory Note
Cyber Risks from China: How Contract Negotiations Can Mitigate IT Risks
China is an important economic partner for most enterprises, but doing business in and with China introduces its own set of risks. This report provides an overview of the major cyber related risks...
Learn more
Webinar Recording
Webinar Recording
Gain a Unified Business View With Enterprise Identity Management
Identity Governance and Administration (IGA) is continuing to evolve through more integrated Identity and Access Governance solutions. IGA products are often required to give deep integrations...
Learn more
Reflections on the Okta Breaches: We All Live in Glass Houses Now
Blog
Reflections on the Okta Breaches: We All Live in Glass Houses Now
When the closing bell rang at the NASDAQ on November 29, 2023, Okta shares had been devalued by nearly 7% and received six downgrades from previous estimates, despite the company’s...
Are You Prepared for the True AD Disaster?
Webinar Recording
Are You Prepared for the True AD Disaster?
In this webinar, we will look at Disaster Recovery planned right and done right – preparation is key to success The central role of directory services for the entire IT Events...
Conquering Crisis: Effective Strategies for Incident Management
Event Recording
Conquering Crisis: Effective Strategies for Incident Management
Immerse yourself in an in-depth exploration of the strategies of incident management. Through critical examination of real-world cases and emerging trends, they illuminate the integral stages of...
Zero Trust in a World of Everything, Everyone, Everywhere, All at Once
Event Recording
Zero Trust in a World of Everything, Everyone, Everywhere, All at Once
In a world where everything and everyone is interconnected, traditional cybersecurity is outdated. Zero Trust, a security framework that assumes nothing can be trusted implicitly, is the...
A Taste of AI & Phishing 2.0, a Data Rodeo
Event Recording
A Taste of AI & Phishing 2.0, a Data Rodeo
This session provides palpable illustrations of the latest LLM technologies and hands-on suggestions on how to tackle the challenges arising from automated, emotionally aware, and generative AI...
Panel | Arresting Disaster: Driving Incident Response in Cyber-Regulated Europe in an Age of AI Threats
Event Recording
Panel | Arresting Disaster: Driving Incident Response in Cyber-Regulated Europe in an Age of AI Threats
In today’s volatile cyber landscape, threats are increasingly sophisticated ( e.g. AI-powered ransomware and data exfiltration techniques ), and the regulatory environment is ever-changing....
Autonomous Ethical Hacking for Accurate and Continuous Security Testing
Event Recording
Autonomous Ethical Hacking for Accurate and Continuous Security Testing
Organizations nowadays are agile and tech-dependent, deploying updates frequently and relying ons 3rd parties. This leads to dynamic and complex digital systems with exposed and vulnerable assets....
From Encryption to Extortion: The New Face of Ransomware Attacks
Event Recording
From Encryption to Extortion: The New Face of Ransomware Attacks
The surge in ransomware attacks has become one of our most pressing cybersecurity challenges. With attackers continuously adapting and refining their tactics, staying abreast of the latest...
Architecting Your SOC to Defend Against Today's Attack Vectors
Advisory Note
Architecting Your SOC to Defend Against Today's Attack Vectors
Organizations must prioritize architecting a modern Security Operations Center (SOC) as it is becoming more critical for strengthening their cybersecurity defenses against sophisticated cyber...
A Secure Supply Chain is Impossible. Here is why.
Blog
A Secure Supply Chain is Impossible. Here is why.
Cyberattacks in the global supply chain are the new wild frontier. Many will feature theft of credentials, later used for major attacks including ransomware on much larger partner companies. But...
Analyst Chat #190: Cyberproof Your Business - Unpacking EU's DORA Framework for Digital Resilience
Analyst Chat
Analyst Chat #190: Cyberproof Your Business - Unpacking EU's DORA Framework for Digital Resilience
In this episode, host Matthias and guest Warwick Ashford dive into the EU's Digital Operational Resilience Act (DORA). They discuss its impact on the financial sector's cybersecurity and...
Cyber Risks from China: How Contract Negotiations Can Mitigate IT Risks
Advisory Note
Cyber Risks from China: How Contract Negotiations Can Mitigate IT Risks
China is an important economic partner for most enterprises, but doing business in and with China introduces its own set of risks. This report provides an overview of the major cyber related risks...
1 2 3 4 5 6 7 8 9 Next