Dr. Komitas Stepanyan - Auditing Cybersecurity Governance: Putting the Elephant in the Fridge Dec 12, 2019
Extending Beyond the Limits of Multi-Factor Authentication With Continuous Adaptive Trust Dec 04, 2019
Dr. Niklas Hellemann - Next Generation Phishing – Social Engineering in Times of Voice Phishing, AI and Dee... Dec 04, 2019
Getting a Grip on Your AI: Know What It Does. Understand the Risks and Rewards. Be Compliant Nov 05, 2019
Martin Kuppinger - New Technologies, New Challenges, New Opportunities: Finding The Right Balance Sep 19, 2019
Challenges for Managed Service Providers Offering Privileged Account Management as a Service Jul 03, 2019
Mit Access-Governance-Projekten neue Vorschriften erfüllen, ohne das Rad neu zu erfinden Jun 27, 2019
Is Multilayered Cyber-Defense Out Already? Against Rising Breaches and Vulnerabilities, Data-Centric Securi... May 24, 2019
The No. 1 Rule of Secure Cloud Migration: Know Your Unstructured and Dark Data and Where It Is Located May 22, 2019
Panel: Tower Defense, Identity Edition: Zero Trust, Machine Learning, MFA & Passwordless - How to Prevent y... May 15, 2019
Jochen Werne - HUMAN. DIGITAL. CULTURE - Disruption or just Progress? Impacts of Artificial Intelligence on... May 14, 2019
Adding Depth to Your IAM: Automating Microsoft Active Directory and Azure AD Administration May 02, 2019
Secure Login for Highly-Regulated Hybrid Environments: Avoid Being Forced Into the Cloud Apr 26, 2019
The Fast Track to Regulatory Compliance: Lean, Efficient, and User-Centric Access Governance Apr 10, 2019
The Foundation for GDPR Compliance and PI/PII Protection: Understand Where Data Resides and Who Processes It Apr 03, 2019
Solving New Authentication Challenges While Finding Parity Between User Experience and Security Jan 16, 2019