Insights

Zero Trust

The Zero Trust paradigm focuses on eliminating implicit trust from IT architectures and enforcing strict identity verification and access controls for every user or device.

Zero Trust helps to redesign your cybersecurity architecture to function consistently and holistically across multiple IT environments and systems – and thus implementing Zero Trust properly will affect multiple existing and new security controls within your organization.

Guide
Guide
The Comprehensive Guide to Zero Trust Implementation
Read the full guide to learn how you can use Zero Trust to protect modern hybrid IT environments. Zero Trust applies to every aspect of an organization's processes.
Learn more
KC Open Select
KC Open Select
Zero Trust Network Access
Zero Trust Network Access (ZTNA) is becoming increasingly essential as organizations adapt to remote work, cloud adoption, and the growing sophistication of cyber threats.
Learn more
Blog
Blog
Securing the Digital Universe: Where Do We Even Start?
What a huge topic. The Digital Universe. Is this more than the Metaverse or less? Anyway: We live in the Digital Age. The vast majority of organizations rely on digital services to run at least...
Learn more
Whitepaper
Whitepaper
How to Implement a Zero Trust Security Model With TrustBuilder’s Adaptive Authentication and Fine-Grained Authorization
Every organization, regardless of size or industry, needs an agile and modern Identity and Access Management (IAM) platform. As the cybersecurity threat landscape continues to evolve, so do the...
Learn more
Event Recording
Event Recording
Workshop | Strategy, Risk, and Security: Building Business Resilience for Your Organization
Every business should be equipped to understand for itself what most threatens and endangers its business model. This is the starting point for preparation measures for disruptions and crises...
Learn more
Workshop | Strategy, Risk, and Security: Building Business Resilience for Your Organization
Event Recording
Workshop | Strategy, Risk, and Security: Building Business Resilience for Your Organization
Every business should be equipped to understand for itself what most threatens and endangers its business model. This is the starting point for preparation measures for disruptions and crises...
Workshop | Break the Kill Chain – An Intelligence-Led Model to Cyber Defence
Event Recording
Workshop | Break the Kill Chain – An Intelligence-Led Model to Cyber Defence
Workshop | From Asset Management to Asset Intelligence: Crossing the CAASM
Event Recording
Workshop | From Asset Management to Asset Intelligence: Crossing the CAASM
As the sprawl of devices, device types, and solutions continues to skyrocket, environments only grow more complex. But there's good news: asset management has evolved. Today’s...
Workshop | Implementation of a Risk Class Model Within Access Management
Event Recording
Workshop | Implementation of a Risk Class Model Within Access Management
In this workshop, we will show you how to implement a risk class-based approach within access management with little effort in order to achieve the highest level of control, compliance and...
Panel | Misinformation – Disinformation – Malinformation (MDM): The Next Big CISO Challenge?
Event Recording
Panel | Misinformation – Disinformation – Malinformation (MDM): The Next Big CISO Challenge?
Even though MDM has had a long history during war and times of high tension,  the digital era has been increasing reach and potential impact of weaponized misinformation. Sophisticated tools...
Successfully tackling your Digital Supply Chain Risk
Event Recording
Successfully tackling your Digital Supply Chain Risk
In this talk, Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will provide insights on Digital Supply Chain Risk. He will look at the areas of risks, from secure partner onboarding...
Building Resilience After a Major Incident
Event Recording
Building Resilience After a Major Incident
This presentation will explore resilience measures to be taken immediately after a major incident.
Resilience and the Need for Privacy
Event Recording
Resilience and the Need for Privacy
This presentation will explore the role of privacy in building enterprise resilience.
Risk-Based Cyber Reporting Best Practices
Event Recording
Risk-Based Cyber Reporting Best Practices
Cybersecurity reporting is a critical mechanism to ensure effective commincation of significant security issues across different levels of your organization - from software architects to the...
Learn How SD Worx Turned Its Cybersecurity Strategy Into a Business Enabler
Event Recording
Learn How SD Worx Turned Its Cybersecurity Strategy Into a Business Enabler
Model to Quantify Cyber Security Risks
Event Recording
Model to Quantify Cyber Security Risks
Get a model and recommendations to quantify cyber security risks including the costs of fines, contractual compensations, service credits, and loss of income. The use of heatmaps with...
Exploring the Impact of Cybersecurity Regulations in the Digital World
Event Recording
Exploring the Impact of Cybersecurity Regulations in the Digital World
The European Commission is working on various legal initiatives for the European Union related to the digitial world, and they are in various states of being adopted. This presentation gives an...
Previous
3 4 5 6 7 8 9 Next