Insights

Digital Transformation

Digital Transformation (DX) is aimed at enabling organizations to succeed in the digital age by gaining or maintaining a competitive edge. This is achieved by improving engagement with and services for employees and customers, and driving productivity and efficiency through the application of digital technologies.

Guide
Guide
Digital Transformation: Strategy and Technology Fundamentals
Digital Transformation is the integration of digital technologies into all products, services, processes, and strategies to enable the business to succeed in the digital age.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
Future Cybersecurity Threats: Be Prepared
Preparing for future cybersecurity threats can be daunting, but it really doesn’t have to be the case if cyber security leaders recognize the true nature of the challenge. An analysis of past...
Learn more
Whitepaper
Whitepaper
How to Do Identity Right When Developing Digital Services
In the digital age, digital experience heavily impacts the success of businesses. A main element of digital experience is the registration, authentication and authorization flow. Instead of...
Learn more
Event Recording
Event Recording
Model, Measure, Manage - The Journey to Autonomous Security in a Hybrid Multi-Cloud World
We cannot manage what we cannot measure.
Learn more
Automation, Insight, AI: The Strategic Importance of a Data Fabric for Security
Event Recording
Automation, Insight, AI: The Strategic Importance of a Data Fabric for Security
The Elastic InfoSec team is responsible for securing Elastic’s globally distributed, remote-first workforce, and the planet scale, multi-cloud, Elastic Cloud platform. Taking data driven...
The Human Factor: Why people are the main key to cybersecurity?
Event Recording
The Human Factor: Why people are the main key to cybersecurity?
When it comes to cybersecurity, many people focus on red/blue teams and technical measures such as servers, firewalls, encryption, and intrusion prevention systems. However, one crucial factor...
Smart threat defense thanks to AI-powered threat intelligence and security awareness training
Event Recording
Smart threat defense thanks to AI-powered threat intelligence and security awareness training
Learn why the use of artificial intelligence (AI) through threat actors makes a "new security awareness" on the user side essential.   Key areas of focus: - How can AI-based...
No Experience Needed - Addressing the Global Cybersecurity Workforce Gap by Expanding Career Pathways
Event Recording
No Experience Needed - Addressing the Global Cybersecurity Workforce Gap by Expanding Career Pathways
The 2023 Cybersecurity Workforce Study identifies a daunting 4 million-person workforce gap. This shortfall in qualified candidates hampers industry growth. To tackle this challenge, the industry...
The Shield of Innovation: How Technology Empowers Fraud Prevention
Event Recording
The Shield of Innovation: How Technology Empowers Fraud Prevention
Fraud is a major cost to businesses worldwide. Banking, finance, payment services, and retail are some of the most frequent targets of fraudsters. However, insurance, gaming, telecommunications,...
Elevate your Email Security: Advanced Protection for M365 using AI (plus a more efficient SOC/XDR)
Event Recording
Elevate your Email Security: Advanced Protection for M365 using AI (plus a more efficient SOC/XDR)
Join us on a journey through the current cybersecurity threat landscape and discover how Mimecast is the perfect companion to Microsoft Defender for Office 365 in order to defend against evolving...
HP Endpoint Security - Time for a Different Endpoint Security
Event Recording
HP Endpoint Security - Time for a Different Endpoint Security
IT Security – In a General Perspective: Security Investment vs. Success New Goals, Rediscovering Old Objectives Closing the Gap with HP Wolf Security
AI Will Not Do the CISO's Job
Event Recording
AI Will Not Do the CISO's Job
As artificial intelligence continues its upward trajectory, a radical proposition emerges: Could AI take the helm of cybersecurity leadership? This bold discourse dives into the heart of this...
Autonomous Ethical Hacking for Accurate and Continuous Security Testing
Event Recording
Autonomous Ethical Hacking for Accurate and Continuous Security Testing
Organizations nowadays are agile and tech-dependent, deploying updates frequently and relying ons 3rd parties. This leads to dynamic and complex digital systems with exposed and vulnerable assets....
From Encryption to Extortion: The New Face of Ransomware Attacks
Event Recording
From Encryption to Extortion: The New Face of Ransomware Attacks
The surge in ransomware attacks has become one of our most pressing cybersecurity challenges. With attackers continuously adapting and refining their tactics, staying abreast of the latest...
Secure software engineering: The sleeping giant in the GenAI Era
Event Recording
Secure software engineering: The sleeping giant in the GenAI Era
In the realm of cybersecurity, there's one truth we can't escape: Building secure products from the get-go is the most effective, cost-efficient, and innovative approach to achieving cyber...
Building an AI skills Workforce
Event Recording
Building an AI skills Workforce
In this presentation Paul Fisher connects the dots between Henry Ford, Stanley Kubrick and AI. He explains how AI is useless without good data and good data for cybersecurity can only be prepared...
Previous
1 2 3 4 5 6 7 Next