Insights

Digital Transformation

Digital Transformation (DX) is aimed at enabling organizations to succeed in the digital age by gaining or maintaining a competitive edge. This is achieved by improving engagement with and services for employees and customers, and driving productivity and efficiency through the application of digital technologies.

Guide
Guide
Digital Transformation: Strategy and Technology Fundamentals
Digital Transformation is the integration of digital technologies into all products, services, processes, and strategies to enable the business to succeed in the digital age.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
A Secure Supply Chain is Impossible. Here is why.
Cyberattacks in the global supply chain are the new wild frontier. Many will feature theft of credentials, later used for major attacks including ransomware on much larger partner companies. But...
Learn more
Executive View
Executive View
IBM Watson OpenScale
IBM Watson OpenScale a solution to enable the responsible monitoring and management of AI projects. The comprehensive attention to data management, analytics, model training, deployment, and model...
Learn more
Event Recording
Event Recording
Panel | Centralized vs. Decentralized: Pros, Cons, Use Cases
Learn more
Digital Trust in the Metaverse & Decentralized Internet of Everything
Event Recording
Digital Trust in the Metaverse & Decentralized Internet of Everything
Phishing, hacking, threats, fraud, and malicious behavior online of all types all share a common root: verification. In this session we’ll go beyond identity and explain how decentralized...
The Identity Security Blind Spot: MFA for Legacy Systems and Service Accounts
Event Recording
The Identity Security Blind Spot: MFA for Legacy Systems and Service Accounts
MFA and other identity security controls are very effective in stopping cyber attacks, and are widely used on modern apps, but until now they couldn't be applied to legacy apps, service accounts...
State and Future of Digital Identity – Results from a KuppingerCole Study
Event Recording
State and Future of Digital Identity – Results from a KuppingerCole Study
KuppingerCole conducted a series of polls over the past months, gathering data about the state and future of IAM. Together with the ongoing market sizing analysis and predictions of the...
Designing Your Future Identity Fabric Program
Event Recording
Designing Your Future Identity Fabric Program
An Identity Fabric Program program moves beyond established tooling and focuses on outcomes and the elimination of technical debt or heavy customizations that hinder the organization’s...
A 4 Year Journey Towards a Smooth and Strong e-Signing Solution in a Multi-National Insurance Company
Event Recording
A 4 Year Journey Towards a Smooth and Strong e-Signing Solution in a Multi-National Insurance Company
A journey of the multi-national insurance company to find and introduce a smooth corporate e-signing solution, both legally and technically well-justified. A story of considering and aligning...
EUDI Wallet - Critical Success factors for Digital Single Market and Private Sector Use
Event Recording
EUDI Wallet - Critical Success factors for Digital Single Market and Private Sector Use
Why the private sector is the major milestone for the European Identity Wallet to succeed ? Let’s discuss: • Will the current EUDI-wallet enable or hamper eg the banking...
European Identity & Cloud Awards Ceremony
Event Recording
European Identity & Cloud Awards Ceremony
OpenWallet Deepdive
Event Recording
OpenWallet Deepdive
Prompt Engineering for Identity Security Professionals | Workshop
Event Recording
Prompt Engineering for Identity Security Professionals | Workshop
ChatGPT mainly is what you make out of it. If you are an author it will help you writing. If you are a tech analyst it will help you create a list of critical capabilities for a certain species of...
Opening Session
Event Recording
Opening Session
Identity Inclusion – Why it Matters
Event Recording
Identity Inclusion – Why it Matters
The cornerstone of the digital world is trust and key to that experience is a secure and verifiable digital identity. More than one billion people worldwide lack a basic verifiable identity....
Ditch Siloed IAM: Convergence, a Must For Identity Threat Detection & Response
Event Recording
Ditch Siloed IAM: Convergence, a Must For Identity Threat Detection & Response
An increase in the types of digital identities, coupled with multi-cloud adoption, has added complexity to managing identities and privileges. How does one get future-ready, to address these...
Previous
4 5 6 7 8 9 10 Next