Securing the Digital Frontier
Combined Session
Thursday, June 06, 2024 11:00—12:00
Location: A 05-06
Log in to download presentations
Thursday, June 06, 2024 11:00—12:00
Location: A 05-06
Watch the video
In a modern Zero Trust based IT architecture, the IDP is one of the most central components and therefore one of the most critical ones.
As all the requests within the network need to be authenticated, its robustness directly correlates with the overall integrity and continuity of digital and therefore-business operations.
Not only the availability but also low latency is key in global distributed ecosystems.
As experience has shown, one hyperscaler can’t guarantee this high demand in availability on its own.
To fulfill all these needs from businesses, applications and corporate we – together with our partners – came up with an multi region - multi hyperscaler architecture.
This talk will provide insight into the design, benefits, and drawbacks as well as the journey we have taken to reach this goal.
Watch the video
In the digital age, identity has transcended personal identification, evolving into a complex digital footprint that is as unique as it is vulnerable. This session focuses on the multifaceted and often hidden threats that lurk within digital identity to unravel the digital threats that individuals and organizations face in today's interconnected world.
We will explore the mechanics and implications of various threat vectors, including the insidious rise of bot attacks, the complexities of fraud, the nuances of credential stuffing, the emerging menace of synthetic identity fraud, and the impact of Generative AI to provide an understanding of how these threats operate and interconnect.
Our journey will take us through real-world scenarios and case studies to illustrate the technical aspects of these threats and their real-time impact on businesses and individuals, and to extract key lessons and insights. We will also look at proactive strategies and innovative solutions to combat these threats and safeguard digital identities.
Targeted at professionals, enthusiasts, and anyone vested in the digital identity ecosystem, this session promises to be an eye-opener, challenging conventional perceptions and encouraging a deeper understanding of what lies beneath the surface of digital identity.
Join us as we explore the dark side of digital identity, where unseen threats pose unseen challenges.
Watch the video
Cybersecurity is the biggest challenge of our time. Organizations don't need to deal with the question if they might be affected, they have to face the challenge of how fast they are able to recover once hit by a cyber incident.
Data protection as the “last line of defense” is particularly important, but data protection begins well before backup and recovery and goes far beyond creating an incident response plan.
This presentation addresses approaches to how a modern cyber resilience platform secures your “last line of defense” and increases resilience across the entire life cycle of company data with the cornerstones of a resilient IT infrastructure like
- Monitoring integrity and security
- Early detection
- Threat analysis
- Cleanroom Recovery options