Insights

Digital Transformation

Digital Transformation (DX) is aimed at enabling organizations to succeed in the digital age by gaining or maintaining a competitive edge. This is achieved by improving engagement with and services for employees and customers, and driving productivity and efficiency through the application of digital technologies.

Guide
Guide
Digital Transformation: Strategy and Technology Fundamentals
Digital Transformation is the integration of digital technologies into all products, services, processes, and strategies to enable the business to succeed in the digital age.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Webinar
Webinar
Security Alert Overload: MDR is the Answer
Industrialized cyber-criminal operations and increased nation-state-sponsored cyber espionage activities mean that most organizations are under continual cyber-attack, but the worldwide shortage of...
Learn more
Blog
Blog
CIO Advice: How to Make Your Digital Business Fly
Doing IT right is the premise for delivering time-to-value in the Digital Journey. Success requires an agile IT for delivering secure Digital Services on time. Virtually all organizations...
Learn more
Leadership Brief
Leadership Brief
Responding to Critical Software Vulnerabilities
New software vulnerabilities are being discovered all the time and each provides an opportunity for cyber adversaries to disrupt your business. Where a new vulnerability affects a widely used...
Learn more
Event Recording
Event Recording
Lessons Learned from IAM Transformation in Banking
Legacy IAM cannot be just "improved". It needs a "Transformation". But how an IAM transformation could be successful in the financial sector, especially banking? In this presentation I would like...
Learn more
Event Recording
"The Great Resignation" Combined with an Explosion in IT Complexity - How Can IT Weather this Perfect Storm?
Knowing differences between Cyber Resistance and Cyber Resilience
Event Recording
Knowing differences between Cyber Resistance and Cyber Resilience
You've probably heard about Cyber Resilience, but what should be the differences between the two terms in the context of Cybersecurity? Cyber Resistance is the same or not?. During this...
Panel | Protocols, Standards, Alliances: How to Re-GAIN the Future Internet from the Big Platforms
Event Recording
Panel | Protocols, Standards, Alliances: How to Re-GAIN the Future Internet from the Big Platforms
In talking about a "Post Platform Digital Future", it is all about a Vision, or better: mission to not let the current platform dominance grow any further and create the foundations for a...
In Transition - From Platforms to Protocols
Event Recording
In Transition - From Platforms to Protocols
Only a few years ago the identity ecosystem seemed to be ‘set’ with little chance for change or dislocation of the large federated identity providers. Today the entire identity...
Enabling Digital Identity Ecosystems
Event Recording
Enabling Digital Identity Ecosystems
The impact of decentralized identity solutions in the marketplace, insights and lessons
Event Recording
The impact of decentralized identity solutions in the marketplace, insights and lessons
Long theorized as the solution to the verification problem on the internet, decentralized identity has now achieved lift-off in the marketplace. In this workshop, we’ll explain who’s...
Closing Keynote & Announcement of EIC 2022 Gamification Winners
Event Recording
Closing Keynote & Announcement of EIC 2022 Gamification Winners
OT Patch Management Best Practices
Event Recording
OT Patch Management Best Practices
Enabling MFA and SSO for IoT and Constrained Devices
Event Recording
Enabling MFA and SSO for IoT and Constrained Devices
Inside the Mind of a Hacker – From Initial Access to Full Domain Admin
Event Recording
Inside the Mind of a Hacker – From Initial Access to Full Domain Admin
Ethical Hacker Joseph Carson will demonstrate a real-world use case of how a cyber adversary gains an initial foothold in your network through compromised credentials and then elevates control and...
Previous
5 6 7 8 9 10 11 Next