Cybersecurity Innovation Night 2018 - Machine Learning & Deep Learning for Secure Future Dec 20, 2018
Dr. Rachel Suissa - Mapping the Comprehensive Cyber Human Factor with Implications on AI and Future Cyber L... Dec 18, 2018
H. Huetter, B. Peeters and D. Roeper - Managing Complexity in a CIAM Migration Project - A Case Study of th... Dec 18, 2018
Alexei Balaganski - The Sorry State of Consumer IoT Security and How Can We Possibly Fix it Dec 18, 2018
Dr. Frank Dudek - Accelerating Cybersecurity – Is Your Information Security Program Up to Speed? Dec 18, 2018
Martin Kuppinger - User Behaviour: The Link between CyberSecurity and Identity Management Dec 18, 2018
Dr. Michael von der Horst - The Current Threat Landscape: A 360° View and Effective Remediation Strategies Dec 18, 2018
Dragan Pendic - Path to Zero Trust Security - Data Veracity, When Truth Is Essential and Trust Optional Dec 18, 2018
Martin Kuppinger - User Behavior Analytics: Can We? Should We? Must We? And if, How to Do It Right? Dec 18, 2018
Peter Gyongyosi - Can You Trust UBA? -- Evaluating Machine Learning Algorithms in Practice Dec 18, 2018
5 months of GDPR – status quo on implementation of the most extensive digital law in the world Nov 13, 2018
An Overview of the Leadership Compass: Adaptive Authentication and Cloud-Based Multi-Factor Authentication Nov 09, 2018
How to Handle Consent to Be Compliant With the GDPR and the Upcoming ePrivacy Regulation Nov 07, 2018
Customer Identity Access Management (CIAM): Creating the Foundations for User Focused Digital Business, GDP... Oct 04, 2018
Prepare for PSD2 with Strong Customer Authentication, Fraud Risk Management and Open Banking APIs Sep 13, 2018
Identity is Security: Avoiding the Pitfalls of an Authentication-Centric Security Architecture Jun 27, 2018
Closing the Loop Between Audit and Action: Meet Compliance Needs With Privileged Access Management Jun 27, 2018
Datendiebstahl, Malware, DSGVO - Unstrukturierte Daten Zwischen Kollaboration & Compliance Jun 19, 2018
Wie Sie mit der Kombination aus Technologie und Awareness eine zukunftsfähige Cybersecurity-Strategie entwe... Jun 15, 2018
Policy-Based Access Management – A Reliable Foundation for Your Next-Generation Unified IAM Jun 07, 2018
Rene Mulder - Challenges to the Wide-Spread Adoption of DLT-Based Self-Sovereign Identity May 17, 2018
Joy Chik - Planning for Tomorrow: Connecting Identities for People, Processes, and Things May 16, 2018
Prof. Dr. Heiko Beier - Is it Facebook's End Game? Why Social Networks as we know them Today will not Survive May 16, 2018
Martin Kuppinger - The Future Model of Identity: Blockchain ID and the Digital Transformation May 15, 2018
Drs. Jacoba C. Sieders - Digital Identities and Blockchain: Experiments and Use Cases @ ABNAMRO May 15, 2018
Patrick Parker - The AI and Robotic Process Automation Revolution and the Upcoming Redesign of IAM May 15, 2018
Privileged Attack Vectors: Verständnis und Minimierung interner und externer Cyber-Risiken Apr 20, 2018
Faktor Mensch: Wie man das schwächste Glied der IT-Infrastruktur Ihres Unternehmens schützt Mar 14, 2018
Daniel Kjellén - Say Goodbye to the Service Formerly Known as Banking – A Case Study on the Changes We Expe... Mar 09, 2018
Martin Kuppinger - 2018 - The Year of Disruption: Why the Finance Business Will Never Be the Same Again Mar 09, 2018
Urs Zurbuchen - Revised Payment Service Directive: Understanding Its Technical Requirements for a Smooth an... Mar 09, 2018
The Evolution of Identity Governance: From Basic Compliance to Federated Security Assurance Feb 21, 2018