Cybersecurity Fabric

Video

The Concepts and Technologies that Comprise Contemporary Cybersecurity Fabrics

In this keynote, we will begin by describing the current threat landscape, and then by defining and scoping out the overall set of complementary and overlapping security technologies that are available in the market today.  SASE: Secure Access Service Edge = connectivity +…

Video

How to use the ISO 27002:2022 to model and quantify cyber security risks

During the session with a demo, participants will receive - practical recommendations to adjust security controls to address changes in the new ISO 27002, - a model to link vulnerabilities to ISO controls, threats to vulnerabilities and confidentiality, integrity and availability…

Video

Panel | The Future of Cybersecurity Fabrics

Cybersecurity Fabrics as a concept has established itself as a common paradigm for securing organizations across the world. This panel will explore where Cybersecurity Fabrics stand today, what the future holds for the paradigm as well as what to consider when prioritizing cybersecurity…

Video

The Changing Cyber Threat Landscape – How to win the war against cybercriminals

Security leaders face an uphill task as cyber-criminals become increasingly creative, highly innovative, and armed with an arsenal of seemingly unlimited resources. Rapid digitalization to re-capture post-pandemic growth coupled with an uncertain geopolitical climate, businesses face…

Video

Security Automation: Why and Why Not?

This presentation will explore why companies need security automation and how they can ensure success. Leveraging professional experience and doctoral research into security automation, the presenter will examine the keys to successful security automation, including how to prioritize use…

Virtual Event

Jun 22, 2022: Managing Complexity: How to Define an Enterprise Cybersecurity Fabric That Delivers

Cyber-Attacks are increasing in frequency and they are getting smarter at an amazing pace, with each successful hit being potentially more disastrous than the last, causing greater destruction and incurring higher recovery costs. At the same time, we are working hard to increase resilience…

Video

Analyst Chat #56: The Project Road Towards Zero Trust - What to Do and Where to Start

This podcast has already looked at the Zero Trust concept as a challenging architectural paradigm for security and an important component of modern and future-oriented security architectures from various angles. This time Christopher and Matthias focus on a phased project approach towards…

Video

How Security and Identity Fabrics Work to Help Improve Security

Many organizations struggle or even fail because they overcomplicate the implementation and extension of their cybersecurity toolset. Most do not have a central approach on security, and often use a set of tools that are not well-integrated with each other.

Video

Analyst Chat #31: A Cybersecurity Reference Architecture for Your Security Fabric

Christopher Schuetze and Matthias Reinwarth discuss a security architecture blueprint that implements the concept of Security Fabric.

Video

Analyst Chat #28: A Holistic View of Cybersecurity - Introducing the Security Fabric

Christopher Schuetze and Matthias Reinwarth introduce Security Fabric - a new architectural approach towards cybersecurity with the goal to achieve consistent and fully managed security across the whole corporate IT.

Blog

Security Fabric: Investing in the Right Architecture for a Secure Future

Modern and hybrid operating models, Software-as-a-Service, regulatory requirements, working from home, various types of internal and external users, and the phenomenon of BYOD (bring your own device) are challenges we have to face today. Such challenges are constantly emerging, which demands…

Webinar

Sep 30, 2020: How Security and Identity Fabrics Work to Help Improve Security

Many organizations struggle or even fail because they overcomplicate the implementation and extension of their cybersecurity toolset. Most do not have a central approach on security, and often use a set of tools that are not well-integrated with each other.