Insights

Business Resilience

Business Resilience is the ability to adapt quickly to risks and disruptions, while maintaining key business workflows and safeguarding employees, assets, and brand reputation. Business Resilience Management is key to business survival in the face of rapidly changing IT, cyber threat, and regulatory environments.

Guide
Guide
Business Resilience: A Strategic Approach to Business Continuity
Business Resilience Management is key to business survival in the face of rapidly changing IT, cyber threat, and regulatory environments.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Master Class
Master Class
Business Resilience Management in a Pandemic Crisis 
Attend this KC Master Class to learn what actions you can take immediately to handle the current pandemic crisis. In a second stage, an in-depth course will help you bolster your business...
Learn more
Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
Was die IT in der Krise NICHT machen sollte
Martin Kuppinger spricht über die Dinge, die IT-Teams in der Krise in jedem Fall vermeiden sollten.
Learn more
Advisory Note
Advisory Note
Cyber Risks from China: How Contract Negotiations Can Mitigate IT Risks
China is an important economic partner for most enterprises, but doing business in and with China introduces its own set of risks. This report provides an overview of the major cyber related risks...
Learn more
Webinar Recording
Webinar Recording
Managing a Crisis: Prepare for Weathering the Next Storm to Come
While the Covid-19 crisis is still in full effect, many businesses have mastered the first phase of disruption. Now, the time starts to plan for the future, at many levels – financials,...
Learn more
Effective Endpoint Security With Automatic Detection and Response Solutions
Webinar Recording
Effective Endpoint Security With Automatic Detection and Response Solutions
The realization that cyber-attacks are inevitable has led the cybersecurity industry to shift some of its focus to detection and response rather than prevention in recent years. Therefore, the...
Analyst Chat #50: The European Cybersecurity Month - Ensuring Security Beyond Awareness
Analyst Chat
Analyst Chat #50: The European Cybersecurity Month - Ensuring Security Beyond Awareness
This analyst chat episode is the 50th and therefore a bit different. This time Matthias talks to two experienced analysts, Martin Kuppinger and Alexei Balaganski, about the ECSM, the European...
Techniques for Securing Transactions With Identity Verification and Verifiable Claims
Webinar Recording
Techniques for Securing Transactions With Identity Verification and Verifiable Claims
Consumer and Workforce identities are under assault. Cybercrime and fraud are pervasive problems that have only escalated during the pandemic. Even as the number of online and mobile transactions...
Analyst Chat #46: Business Resilience Management Part II
Analyst Chat
Analyst Chat #46: Business Resilience Management Part II
Warwick Ashford and Matthias Reinwarth talk about business resilience again, focusing on cyber supply chain risk management.
Analyst Chat #44: Business Resilience Management
Analyst Chat
Analyst Chat #44: Business Resilience Management
Warwick Ashford and Matthias Reinwarth discuss the prerequisites and challenges of making a business able to adapt quickly to risks and disruptions.  
Remote Workforce: How to Protect Yourself From Emerging Threats?
Webinar Recording
Remote Workforce: How to Protect Yourself From Emerging Threats?
The outbreak of the COVID-19 pandemic has served as a catalyst for digitization in many companies and led to an increase in remote work and adoption of the bring your own device (BYOD) policy....
Analyst Chat #37: COVID Response and Decentralized Identity Solutions/Verifiable Credentials
Analyst Chat
Analyst Chat #37: COVID Response and Decentralized Identity Solutions/Verifiable Credentials
Anne Bailey and Matthias Reinwarth discuss how decentralized identities and verifiable credentials help respond to the pandemic by powering contact tracing applications, immunity passports and...
Gain a Unified Business View With Enterprise Identity Management
Webinar Recording
Gain a Unified Business View With Enterprise Identity Management
Identity Governance and Administration (IGA) is continuing to evolve through more integrated Identity and Access Governance solutions. IGA products are often required to give deep integrations...
Analyst Chat #17: How to Avoid Becoming a Phishing Victim During the Pandemic
Analyst Chat
Analyst Chat #17: How to Avoid Becoming a Phishing Victim During the Pandemic
Matthias Reinwarth and Martin Kuppinger explain how to protect your users from phishing attacks when they're all working from home... Learn more about how to continue successful business with...
Five Golden Rules For Efficient Virtual Collaboration
Video
Five Golden Rules For Efficient Virtual Collaboration
Beyond security and technology: Matthias Reinwarth leverages the experiences of KuppingerCole Analysts in doing advisory via electronic collaboration platforms and shares 5+1 golden rules for...
Why BCM/BCRM and Cybersecurity Must Converge
Video
Why BCM/BCRM and Cybersecurity Must Converge
Analyst Chat #12: Incident Response Management
Analyst Chat
Analyst Chat #12: Incident Response Management
Christopher Schütze and Matthias Reinwarth explain the importance of having an incident response plan.