Insights

Business Resilience

Business Resilience is the ability to adapt quickly to risks and disruptions, while maintaining key business workflows and safeguarding employees, assets, and brand reputation. Business Resilience Management is key to business survival in the face of rapidly changing IT, cyber threat, and regulatory environments.

Guide
Guide
Business Resilience: A Strategic Approach to Business Continuity
Business Resilience Management is key to business survival in the face of rapidly changing IT, cyber threat, and regulatory environments.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Master Class
Master Class
Business Resilience Management in a Pandemic Crisis 
Attend this KC Master Class to learn what actions you can take immediately to handle the current pandemic crisis. In a second stage, an in-depth course will help you bolster your business...
Learn more
Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
Ransomware During the Pandemic Crisis
It is really astonishing how quickly the word “pandemic” has evolved from a subject of obscure computer games to the center of everyone’s daily conversations… However,...
Learn more
Leadership Brief
Leadership Brief
Responding to Critical Software Vulnerabilities
New software vulnerabilities are being discovered all the time and each provides an opportunity for cyber adversaries to disrupt your business. Where a new vulnerability affects a widely used...
Learn more
Webinar Recording
Webinar Recording
Remote Workforce: How to Protect Yourself From Emerging Threats?
The outbreak of the COVID-19 pandemic has served as a catalyst for digitization in many companies and led to an increase in remote work and adoption of the bring your own device (BYOD) policy....
Learn more
Are You Prepared for the True AD Disaster?
Webinar Recording
Are You Prepared for the True AD Disaster?
In this webinar, we will look at Disaster Recovery planned right and done right – preparation is key to success The central role of directory services for the entire IT Events...
Conquering Crisis: Effective Strategies for Incident Management
Event Recording
Conquering Crisis: Effective Strategies for Incident Management
Immerse yourself in an in-depth exploration of the strategies of incident management. Through critical examination of real-world cases and emerging trends, they illuminate the integral stages of...
Zero Trust in a World of Everything, Everyone, Everywhere, All at Once
Event Recording
Zero Trust in a World of Everything, Everyone, Everywhere, All at Once
In a world where everything and everyone is interconnected, traditional cybersecurity is outdated. Zero Trust, a security framework that assumes nothing can be trusted implicitly, is the...
A Taste of AI & Phishing 2.0, a Data Rodeo
Event Recording
A Taste of AI & Phishing 2.0, a Data Rodeo
This session provides palpable illustrations of the latest LLM technologies and hands-on suggestions on how to tackle the challenges arising from automated, emotionally aware, and generative AI...
Panel | Arresting Disaster: Driving Incident Response in Cyber-Regulated Europe in an Age of AI Threats
Event Recording
Panel | Arresting Disaster: Driving Incident Response in Cyber-Regulated Europe in an Age of AI Threats
In today’s volatile cyber landscape, threats are increasingly sophisticated ( e.g. AI-powered ransomware and data exfiltration techniques ), and the regulatory environment is ever-changing....
Autonomous Ethical Hacking for Accurate and Continuous Security Testing
Event Recording
Autonomous Ethical Hacking for Accurate and Continuous Security Testing
Organizations nowadays are agile and tech-dependent, deploying updates frequently and relying ons 3rd parties. This leads to dynamic and complex digital systems with exposed and vulnerable assets....
From Encryption to Extortion: The New Face of Ransomware Attacks
Event Recording
From Encryption to Extortion: The New Face of Ransomware Attacks
The surge in ransomware attacks has become one of our most pressing cybersecurity challenges. With attackers continuously adapting and refining their tactics, staying abreast of the latest...
Analyst Chat #190: Cyberproof Your Business - Unpacking EU's DORA Framework for Digital Resilience
Analyst Chat
Analyst Chat #190: Cyberproof Your Business - Unpacking EU's DORA Framework for Digital Resilience
In this episode, host Matthias and guest Warwick Ashford dive into the EU's Digital Operational Resilience Act (DORA). They discuss its impact on the financial sector's cybersecurity and...
Continuous Exposure Management - Keeping one step ahead of attackers through continuous exposure management
Event Recording
Continuous Exposure Management - Keeping one step ahead of attackers through continuous exposure management
Companies are facing increasingly complex security threats. Many are struggling to assess their own security risks due to an inability to address potential issues as they arise, due to the...
Tech Guidance in the Era of Polycrisis & AI-Driven Disruptive Change
Event Recording
Tech Guidance in the Era of Polycrisis & AI-Driven Disruptive Change
The most interesting thing about recent AI innovations in the field of LLMs (Large Language Models) such as ChatGPT is that there is not much discussion going on about the effects LLMs will have...
Analyst Chat #149: The Top 5 Cybersecurity Trends - Looking Back at CSLS 2022
Analyst Chat
Analyst Chat #149: The Top 5 Cybersecurity Trends - Looking Back at CSLS 2022
Deep Fakes, AI as friend and foe, Business Resilience, Mis-, Dis- and Malinformation: The Cybersecurity Leadership Summit has taken place in Berlin and covered all of this and much more. Martin...
How the Current Crisis could become a Catalyst for Various Transformations
Event Recording
How the Current Crisis could become a Catalyst for Various Transformations
1 2 3 4 5 Next