Insights

Digital Transformation

Digital Transformation (DX) is aimed at enabling organizations to succeed in the digital age by gaining or maintaining a competitive edge. This is achieved by improving engagement with and services for employees and customers, and driving productivity and efficiency through the application of digital technologies.

Guide
Guide
Digital Transformation: Strategy and Technology Fundamentals
Digital Transformation is the integration of digital technologies into all products, services, processes, and strategies to enable the business to succeed in the digital age.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join the iconic identity community from June 4 - 7, 2024 in Berlin, Germany! Get the Prime Discount and register for 1,000 EUR!
Learn more
Blog
Blog
Conversational AI Building Platforms (Market Compass Preview)
AI-based conversational interfaces developed plenty of hype for use cases within marketing, sales, and service management. Various types of solutions are on the market, offered by both small...
Learn more
Executive View
Executive View
ManageEngine PAM360
In the last few years PAM has evolved into a set of targeted technologies that addresses some of the most urgent areas of business security in a period of rapid technological change. Digital...
Learn more
Event Recording
Event Recording
Identity is the New Perimeter: How to Discover, Mitigate and Protect Identity Risks
Two decades of digital transformation and cloud migration have been slowly eroding the traditional network perimeter and with the past two years of transition to more remote work, the walls have...
Learn more
Autonomous Ethical Hacking for Accurate and Continuous Security Testing
Event Recording
Autonomous Ethical Hacking for Accurate and Continuous Security Testing
Organizations nowadays are agile and tech-dependent, deploying updates frequently and relying ons 3rd parties. This leads to dynamic and complex digital systems with exposed and vulnerable assets....
From Encryption to Extortion: The New Face of Ransomware Attacks
Event Recording
From Encryption to Extortion: The New Face of Ransomware Attacks
The surge in ransomware attacks has become one of our most pressing cybersecurity challenges. With attackers continuously adapting and refining their tactics, staying abreast of the latest...
Secure software engineering: The sleeping giant in the GenAI Era
Event Recording
Secure software engineering: The sleeping giant in the GenAI Era
In the realm of cybersecurity, there's one truth we can't escape: Building secure products from the get-go is the most effective, cost-efficient, and innovative approach to achieving cyber...
Building an AI skills Workforce
Event Recording
Building an AI skills Workforce
In this presentation Paul Fisher connects the dots between Henry Ford, Stanley Kubrick and AI. He explains how AI is useless without good data and good data for cybersecurity can only be prepared...
Artificial Intelligence: A New Tool in the Hacker's Arsenal
Event Recording
Artificial Intelligence: A New Tool in the Hacker's Arsenal
Battling the Bots: Enhancing Web Application Security Through Multi-Dimensional Approaches
Event Recording
Battling the Bots: Enhancing Web Application Security Through Multi-Dimensional Approaches
Automated Threats to web applications are according to the Open Web Applications Project (OWASP) a misuse of their inherent valid functionality by applying automated means. Usually, those...
Panel | AI Unleashed: The Battle of Wits in Cybersecurity - Attackers vs. Defenders
Event Recording
Panel | AI Unleashed: The Battle of Wits in Cybersecurity - Attackers vs. Defenders
Risk assessment the attacker way! How secured are your assets in reality?
Event Recording
Risk assessment the attacker way! How secured are your assets in reality?
Attackers don’t sleep and find new ways to get into a company and move laterally through the environment. This session starts with an overview where we come from and the pure reactive...
Building a successful vulnerability management service concept
Event Recording
Building a successful vulnerability management service concept
Vulnerability Management is more then ever an important building block when it comes to early detection of issues to allow a proactive counter measure. This is only possible if various...
Navigating the Complex Landscape: Challenges in Applying AI for Government Security
Event Recording
Navigating the Complex Landscape: Challenges in Applying AI for Government Security
As governments around the world increasingly turn to artificial intelligence (AI) to enhance their security, a myriad of complex challenges emerge. This presentation delves into the multifaceted...
Cyber Risk Quantification – Challenges from a Risk Perspective
Event Recording
Cyber Risk Quantification – Challenges from a Risk Perspective
Modelling Cyber Risk is hard. Only a few historical data in known quality exist. Cyber Risks occur with a low frequency but their impact and severity might be high in case they come to pass. In my...
EDITH #DigiTalk „CVD – Embracing Ethical Hackers”
Event Recording
EDITH #DigiTalk „CVD – Embracing Ethical Hackers”
How can I effectively address cybersecurity vulnerabilities within my organization? Also, what are the implications of the Cyberresilience Act for this? EDITH, the European Digital Innovation Hub...
Previous
1 2 3 4 5 6 7 Next