Christopher Schütze

Cybersecurity Practice Director & Chief Information Security Officer
Stuttgart / Germany
Email    Blog    @IAMSchuetze   

Roles & Responsibilities at KuppingerCole

Christopher is the Chief Information Security Officer and Director Practice Cybersecurity at KuppingerCole. He is responsible for internal information security. In his role as Director Practice Cybersecurity he aims to expand KuppingerCole's expertise in cybersecurity and to further develop exciting topics for advisory, research, and events.

Background & Education

He graduated at the Karlsruhe Institute of Technology and holds a master's degree in computer science with a focus on software engineering and telematics. He also has many years of experience in infrastructure and cloud technologies and is certified in PRINCE2 Agile.

Areas of coverage

  • Authentication and Authorization
  • Cybersecurity
  • Privileged Access Management
  • Cloud Technology
  • IAM/IAG Guidelines, Processes, Organization

Professional experience

Christopher was Head of Cloud Security at an auditing company and working at two integrators for identity and access management. He has provided clients with technical and strategic support in a wide variety of projects. He specializes in security topics in networked environments with in-depth technological and process-related considerations.

With almost 15 years of experience in IAM and Cybersecurity, Christopher is experienced in advising clients on a strategic level with necessary technological background. He holds a Master's degree in Computer Science from the Karlsruhe Institute of Technology and combines both theoretical background and technical expertise. Christopher is an experienced speaker and moderator at KuppingerCole and other events.

Recent research

Executive View

Ping Identity’s PingFederate

PingFederate is among the leading-edge solutions that support identity federation standards. PingFederate can enable Single Sign-On (SSO) between business units, enterprises, and all popular SaaS applications. PingFederate works both on-premises or in the cloud and is easy for…

Executive View

CyberArk

Privileged Access Management (PAM) has evolved into a set of technologies that address some of today's most critical areas of cybersecurity in the context of digital transformation and industrial change. The CyberArk Core Privileged Access Security solution is designed to secure and protect…

Leadership Brief

Incident Response Management

The probability of becoming a victim of a data breach is now higher than ever. The hyperconnected world and the ever-increasing complexity of modern IT systems and processes pose new challenges for IT staff. All organizations must invest in an Incident Response Management plan. Preparation…

Leadership Brief

Security Fabric: A Methodology for Architecting a Secure Future

Work from home, bring your own device, a professional cyber-crime industry, IoT & OT. We all have to face these challenges while fullfilling a zoo of endless requirements. It is complex to keep the overview and the flexibility in our IT security services and the used toolset. Setting up the…

Executive View

One Identity Manager

One Identity Manager is one of the leading Identity and Access Governance (IAG) solutions. It builds on a sophisticated, consistent concept which allows for intuitive user experience, rapid customization and easy deployment. One Identity Manager is offering a rich toolset and framework to…

Recent blog posts

Blog

Speaking in Cybersecurity: My Recollection!

During my studies and the subsequent first years of my career, I was already always someone who liked to share knowledge with others and present interesting topics. This is not the only reason why my profession has developed in the direction of IT consulting. In fact, in consulting, "being…

Blog

The Evolution of Endpoint Security: Beyond Anti-Malware

15 to 20 years ago, a virus scanner – or let me call it Endpoint Protection – on your private or corporate computer was standard. Today, you must also have something like a virus scanner on your endpoint device. But in 2020, is it sufficient to detect viruses, worms,…

Blog

Security Fabric: Investing in the Right Architecture for a Secure Future

Modern and hybrid operating models, Software-as-a-Service, regulatory requirements, working from home, various types of internal and external users, and the phenomenon of BYOD (bring your own device) are challenges we have to face today. Such challenges are constantly emerging, which…

Blog

KuppingerCole Analyst Chat: Cybersecurity Portfolio Optimization

Matthias Reinwarth and Christopher Schütze talk about how to efficiently identify and rate your investments into Cybersecurity. Free Analyst Advice: Business Resilience Management (Crisis Roadmap for Beginners)

Blog

3 Steps to Improve Your Cybersecurity with Enterprise Risk Management

If you start considering the topic of cybersecurity in your company, you’ll quickly realize that there are many facets. In traditional companies, IT has grown in parallel to meet the requirements in digitization and production in a timely manner. These traditional companies and…

Recent videos

Video

Analyst Chat #143: Vulnerability Management: Emergency Patching and How to Deal with "Zero Days"

Sometimes Vulnerability Management has to take care of current threats very quickly: Christopher Schütze is today's guest in this episode and explains which processes are necessary when a system needs to be updated very quickly, for example because there is a current threat, e.g. a…

Video

Analyst Chat #94: From Ransomware to Globally Assured Identities (EIC 2021 Special)

EIC 2021 finally took place in Munich in a hybrid format between on-site and online. Of course, Matthias took the opportunity to sit down with his analyst colleagues in person for some EIC special analyst chat episodes. In the first of three specials, Christopher Schütze talks to him about…

Video

Analyst Chat #91: Vulnerability Management

Christopher Schütze provides the fundamentals for a pivotal topic in cybersecurity, namely how to create processes and systems for comprehensive and continuously improving vulnerability management. Together with Matthias, he provides an overview of elementary aspects that need to be…

Video

Accelerate Your Digital Transformation Through Identity

Employee Identity & Access Management (IAM) and Consumer Identity & Access Management (CIAM) are typically separate in terms of governance, processes, and technology. But, by leveraging the synergy between the two, businesses can achieve better sales opportunities as well as faster…

Video

Exploring the Intersection of ITSM and ServiceNow

Christopher provides a deep-dive on the intersection of ITSM and ServiceNow