Large and complex cyber systems, often spanning from legacy to cloud systems, are difficult to maintain and operate, including all questions on cyber security. Investing in cyber resilience helps not only in cyber security but also helps building, maintaining and operating these systems.
We will explore some basic patterns for building robust and resilient cyber systems and reflect them on some practical use cases in typical on-premises/cloud scenarios and complex identity management environments.
Key Topics:
* Practical patterns for cyber resilience
* Use cases in on-premises/cloud scenarios and idm