Insights

Digital Transformation

Digital Transformation (DX) is aimed at enabling organizations to succeed in the digital age by gaining or maintaining a competitive edge. This is achieved by improving engagement with and services for employees and customers, and driving productivity and efficiency through the application of digital technologies.

Guide
Guide
Digital Transformation: Strategy and Technology Fundamentals
Digital Transformation is the integration of digital technologies into all products, services, processes, and strategies to enable the business to succeed in the digital age.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
AI Regulation Proposed by EU Commission Walks Fine Line between Prohibition and Innovation Empowerment, with Limited Success
On April 21, 2021, the European Commission proposed a legal framework for Artificial Intelligence that covers all AI systems that impact natural persons within the European Union, regardless of...
Learn more
Whitepaper
Whitepaper
The Benefits of a One-Stop Shop for a Modern, Unified, and Agile IAM Approach
Traditional IAM implementations commonly are mature, but not flexible enough to serve the needs of organizations in the Digital Age. There are more identity types to serve, modern analytics are...
Learn more
Event Recording
Event Recording
Privacy: The Real Cost
Privacy is one of the most challenging aspects to protect in identity solutions. The entities that stand to gain the most from surveilling users can use convenience as a bargaining chip. Users...
Learn more
AI Will Not Do the CISO's Job
Event Recording
AI Will Not Do the CISO's Job
As artificial intelligence continues its upward trajectory, a radical proposition emerges: Could AI take the helm of cybersecurity leadership? This bold discourse dives into the heart of this...
Autonomous Ethical Hacking for Accurate and Continuous Security Testing
Event Recording
Autonomous Ethical Hacking for Accurate and Continuous Security Testing
Organizations nowadays are agile and tech-dependent, deploying updates frequently and relying ons 3rd parties. This leads to dynamic and complex digital systems with exposed and vulnerable assets....
From Encryption to Extortion: The New Face of Ransomware Attacks
Event Recording
From Encryption to Extortion: The New Face of Ransomware Attacks
The surge in ransomware attacks has become one of our most pressing cybersecurity challenges. With attackers continuously adapting and refining their tactics, staying abreast of the latest...
Secure software engineering: The sleeping giant in the GenAI Era
Event Recording
Secure software engineering: The sleeping giant in the GenAI Era
In the realm of cybersecurity, there's one truth we can't escape: Building secure products from the get-go is the most effective, cost-efficient, and innovative approach to achieving cyber...
Building an AI skills Workforce
Event Recording
Building an AI skills Workforce
In this presentation Paul Fisher connects the dots between Henry Ford, Stanley Kubrick and AI. He explains how AI is useless without good data and good data for cybersecurity can only be prepared...
Artificial Intelligence: A New Tool in the Hacker's Arsenal
Event Recording
Artificial Intelligence: A New Tool in the Hacker's Arsenal
Battling the Bots: Enhancing Web Application Security Through Multi-Dimensional Approaches
Event Recording
Battling the Bots: Enhancing Web Application Security Through Multi-Dimensional Approaches
Automated Threats to web applications are according to the Open Web Applications Project (OWASP) a misuse of their inherent valid functionality by applying automated means. Usually, those...
Panel | AI Unleashed: The Battle of Wits in Cybersecurity - Attackers vs. Defenders
Event Recording
Panel | AI Unleashed: The Battle of Wits in Cybersecurity - Attackers vs. Defenders
Risk assessment the attacker way! How secured are your assets in reality?
Event Recording
Risk assessment the attacker way! How secured are your assets in reality?
Attackers don’t sleep and find new ways to get into a company and move laterally through the environment. This session starts with an overview where we come from and the pure reactive...
Building a successful vulnerability management service concept
Event Recording
Building a successful vulnerability management service concept
Vulnerability Management is more then ever an important building block when it comes to early detection of issues to allow a proactive counter measure. This is only possible if various...
Navigating the Complex Landscape: Challenges in Applying AI for Government Security
Event Recording
Navigating the Complex Landscape: Challenges in Applying AI for Government Security
As governments around the world increasingly turn to artificial intelligence (AI) to enhance their security, a myriad of complex challenges emerge. This presentation delves into the multifaceted...
Cyber Risk Quantification – Challenges from a Risk Perspective
Event Recording
Cyber Risk Quantification – Challenges from a Risk Perspective
Modelling Cyber Risk is hard. Only a few historical data in known quality exist. Cyber Risks occur with a low frequency but their impact and severity might be high in case they come to pass. In my...
Previous
1 2 3 4 5 6 7 Next