Insights

Digital Transformation

Digital Transformation (DX) is aimed at enabling organizations to succeed in the digital age by gaining or maintaining a competitive edge. This is achieved by improving engagement with and services for employees and customers, and driving productivity and efficiency through the application of digital technologies.

Guide
Guide
Digital Transformation: Strategy and Technology Fundamentals
Digital Transformation is the integration of digital technologies into all products, services, processes, and strategies to enable the business to succeed in the digital age.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Webinar
Webinar
Navigating the Future of API Security: Trends, Challenges, and Innovations
Today, APIs can be found everywhere — at home and in mobile devices, in corporate networks and in the cloud, even in industrial environments. The emerging era of Generative AI is also entirely...
Learn more
Blog
Blog
AI and Cybersecurity: A New Hope for Cyber Defenders?
Statistics from around the world clearly show that data breaches, ransomware attacks, and other cyberthreats are on the rise. Everyone has high hopes for Artificial Intelligence (AI) technologies...
Learn more
Executive View
Executive View
Sharelock ITDR
ITDR (Identity Threat Detection & Response) is an emerging capability that is of utmost importance for dealing with the ever-increasing number of identity-related threats. Being able to identify...
Learn more
Event Recording
Event Recording
Panel | Multi-Cloud Agility Must-Haves
With a highly prioritized digital tranfsformation towards a composable enterprise, it will be inevitable to work with multi-cloud solutions to achieve the level of agility and flexibility...
Learn more
No Experience Needed - Addressing the Global Cybersecurity Workforce Gap by Expanding Career Pathways
Event Recording
No Experience Needed - Addressing the Global Cybersecurity Workforce Gap by Expanding Career Pathways
The 2023 Cybersecurity Workforce Study identifies a daunting 4 million-person workforce gap. This shortfall in qualified candidates hampers industry growth. To tackle this challenge, the industry...
The Shield of Innovation: How Technology Empowers Fraud Prevention
Event Recording
The Shield of Innovation: How Technology Empowers Fraud Prevention
Fraud is a major cost to businesses worldwide. Banking, finance, payment services, and retail are some of the most frequent targets of fraudsters. However, insurance, gaming, telecommunications,...
Elevate your Email Security: Advanced Protection for M365 using AI (plus a more efficient SOC/XDR)
Event Recording
Elevate your Email Security: Advanced Protection for M365 using AI (plus a more efficient SOC/XDR)
Join us on a journey through the current cybersecurity threat landscape and discover how Mimecast is the perfect companion to Microsoft Defender for Office 365 in order to defend against evolving...
HP Endpoint Security - Time for a Different Endpoint Security
Event Recording
HP Endpoint Security - Time for a Different Endpoint Security
IT Security – In a General Perspective: Security Investment vs. Success New Goals, Rediscovering Old Objectives Closing the Gap with HP Wolf Security
AI Will Not Do the CISO's Job
Event Recording
AI Will Not Do the CISO's Job
As artificial intelligence continues its upward trajectory, a radical proposition emerges: Could AI take the helm of cybersecurity leadership? This bold discourse dives into the heart of this...
Panel | Arresting Disaster: Driving Incident Response in Cyber-Regulated Europe in an Age of AI Threats
Event Recording
Panel | Arresting Disaster: Driving Incident Response in Cyber-Regulated Europe in an Age of AI Threats
In today’s volatile cyber landscape, threats are increasingly sophisticated ( e.g. AI-powered ransomware and data exfiltration techniques ), and the regulatory environment is ever-changing....
Risk assessment the attacker way! How secured are your assets in reality?
Event Recording
Risk assessment the attacker way! How secured are your assets in reality?
Attackers don’t sleep and find new ways to get into a company and move laterally through the environment. This session starts with an overview where we come from and the pure reactive...
Secure software engineering: The sleeping giant in the GenAI Era
Event Recording
Secure software engineering: The sleeping giant in the GenAI Era
In the realm of cybersecurity, there's one truth we can't escape: Building secure products from the get-go is the most effective, cost-efficient, and innovative approach to achieving cyber...
Building an AI skills Workforce
Event Recording
Building an AI skills Workforce
In this presentation Paul Fisher connects the dots between Henry Ford, Stanley Kubrick and AI. He explains how AI is useless without good data and good data for cybersecurity can only be prepared...
Artificial Intelligence: A New Tool in the Hacker's Arsenal
Event Recording
Artificial Intelligence: A New Tool in the Hacker's Arsenal
Battling the Bots: Enhancing Web Application Security Through Multi-Dimensional Approaches
Event Recording
Battling the Bots: Enhancing Web Application Security Through Multi-Dimensional Approaches
Automated Threats to web applications are according to the Open Web Applications Project (OWASP) a misuse of their inherent valid functionality by applying automated means. Usually, those...
Panel | AI Unleashed: The Battle of Wits in Cybersecurity - Attackers vs. Defenders
Event Recording
Panel | AI Unleashed: The Battle of Wits in Cybersecurity - Attackers vs. Defenders
Previous
1 2 3 4 5 6 7 Next