Insights

Digital Transformation

Digital Transformation (DX) is aimed at enabling organizations to succeed in the digital age by gaining or maintaining a competitive edge. This is achieved by improving engagement with and services for employees and customers, and driving productivity and efficiency through the application of digital technologies.

Guide
Guide
Digital Transformation: Strategy and Technology Fundamentals
Digital Transformation is the integration of digital technologies into all products, services, processes, and strategies to enable the business to succeed in the digital age.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
Future Cybersecurity Threats: Be Prepared
Preparing for future cybersecurity threats can be daunting, but it really doesn’t have to be the case if cyber security leaders recognize the true nature of the challenge. An analysis of past...
Learn more
Executive View
Executive View
IBM Watson OpenScale
IBM Watson OpenScale a solution to enable the responsible monitoring and management of AI projects. The comprehensive attention to data management, analytics, model training, deployment, and model...
Learn more
Event Recording
Event Recording
Dr. Michele Nati: Blockchain and Telco: Opportunities, Challenges and Use Cases
Learn more
Veni, Vidi, Vici: How AI will Shape the Future of IGA
Event Recording
Veni, Vidi, Vici: How AI will Shape the Future of IGA
Imagine a world where security risks are identified and mitigated before they even happen. Imagine if access and auditing recommendations were made with the precision of a computer algorithm....
Machine Learning in IAM & IGA
Event Recording
Machine Learning in IAM & IGA
This presentation will provide an overview of the terminology and basics of AI and ML in the context of Identity and Access Management (IAM) and Identity Governance and Administration (IGA). It...
AI & Identity - Perspectives and Use Cases
Event Recording
AI & Identity - Perspectives and Use Cases
Use AI to Make Account Takeover a Frustrating Experience... For the Attacker
Event Recording
Use AI to Make Account Takeover a Frustrating Experience... For the Attacker
Sure, MFA goes a long way in preventing account takeover but it is only one layer. Using AI to look at identity data to evaluate risk can add an additional layers – not only to prevent...
Tech Guidance in the Era of Polycrisis & AI-Driven Disruptive Change
Event Recording
Tech Guidance in the Era of Polycrisis & AI-Driven Disruptive Change
The most interesting thing about recent AI innovations in the field of LLMs (Large Language Models) such as ChatGPT is that there is not much discussion going on about the effects LLMs will have...
Celebrating a Digital Age to Advance Digital Stages of Necessity
Event Recording
Celebrating a Digital Age to Advance Digital Stages of Necessity
Samuel Devasahayam will discuss the past decade of identity sights through Microsoft’s lens, demonstrating that security in a digital age remains valuable, and detailing what these insights...
Lessons Learned from IAM Transformation in Banking
Event Recording
Lessons Learned from IAM Transformation in Banking
Legacy IAM cannot be just "improved". It needs a "Transformation". But how an IAM transformation could be successful in the financial sector, especially banking? In this presentation I would like...
Digital Trust in the Metaverse & Decentralized Internet of Everything
Event Recording
Digital Trust in the Metaverse & Decentralized Internet of Everything
Phishing, hacking, threats, fraud, and malicious behavior online of all types all share a common root: verification. In this session we’ll go beyond identity and explain how decentralized...
The Identity Security Blind Spot: MFA for Legacy Systems and Service Accounts
Event Recording
The Identity Security Blind Spot: MFA for Legacy Systems and Service Accounts
MFA and other identity security controls are very effective in stopping cyber attacks, and are widely used on modern apps, but until now they couldn't be applied to legacy apps, service accounts...
State and Future of Digital Identity – Results from a KuppingerCole Study
Event Recording
State and Future of Digital Identity – Results from a KuppingerCole Study
KuppingerCole conducted a series of polls over the past months, gathering data about the state and future of IAM. Together with the ongoing market sizing analysis and predictions of the...
Designing Your Future Identity Fabric Program
Event Recording
Designing Your Future Identity Fabric Program
An Identity Fabric Program program moves beyond established tooling and focuses on outcomes and the elimination of technical debt or heavy customizations that hinder the organization’s...
A 4 Year Journey Towards a Smooth and Strong e-Signing Solution in a Multi-National Insurance Company
Event Recording
A 4 Year Journey Towards a Smooth and Strong e-Signing Solution in a Multi-National Insurance Company
A journey of the multi-national insurance company to find and introduce a smooth corporate e-signing solution, both legally and technically well-justified. A story of considering and aligning...
Previous
2 3 4 5 6 7 8 Next