Francesco Stasi: AI-Driven Insights From Historical Customer and Employee Conversations: The Next Frontier ... Dec 03, 2020
Martin Kuppinger: Where AI, Industrial IoT, Consumer IoT, Blockchain, Decentralized Identity, and Edge Comp... Dec 03, 2020
Jochen Werne: Verfügungsmacht. Why Access Always Matters. Vergangenheit Verstehen, um Zukunft Sicher Zu Ges... Nov 20, 2020
Markus Malewski, Joerg Hesske: No Chance for Hackers and Spies. Why Thyssenkrupp Takes a Completely Differe... Nov 20, 2020
Wallix Workshop - It`s all about Access! PAM-Lösungen – SetUp und Mehrwert durch Integration Nov 20, 2020
Palo Alto Networks Workshop - Cloud-Native Security is Different and Here is Why - Play Some Capture the Fl... Nov 20, 2020
Alexander Koerner: Holen Sie das Beste aus PAM heraus: Wie man die Verwaltung des privilegierten Accounts s... Nov 20, 2020
Gerald Beuchelt, Daniel Holzinger: Passwörter: gehasst und doch unverzichtbar. Ist passwortlose Authentifiz... Nov 20, 2020
Zoltan Bakos: Integration des Privileged Access Management in wichtige Geschäftsprozesse und -vorgänge, um ... Nov 20, 2020
Dominik Schönwetter: Rollenbasiertes IAM in einem Compliance-getriebenen Unternehmen. Erfahrungsbericht aus... Nov 20, 2020
Mohamed Ibbich: Welche Rolle spielt ein umfassender Privileged Access Management-Ansatz bei der sicheren An... Nov 20, 2020
Ioannis Chrysakis: The CAP-A Best Practice: Towards Enabling a Privacy-Friendly Apps Market by Applying a C... Nov 16, 2020
Christopher Schuetze: Safer With Security - How Fabrics Can Be Used to Manage the Complexity of Your Enterp... Nov 13, 2020
Martin Rohrer: Cyber Navigation in Turbulent Times – How Cyber Maturity Assessments Provide a Sense of Dire... Nov 13, 2020
Darran Rolls: The Confessions of an X-CISO: Identity Centric Security @ Enterprise Scale Nov 12, 2020
Jean-Christophe Gaillard: The Cyber Security Skills Gap: Real Problem or Self-inflicted Pain? Nov 12, 2020
Decoding Advanced Privileged Access Management for Digital Environments - A conversation with Paul Fisher a... Nov 04, 2020
Dr. André Kudra: Integrating Decentralized Identity Into Your Existing Infrastructure: Do's and Don'ts Oct 29, 2020
Richard Meeus: Don’t Treat Your Customers Like Criminals: CIAM Best Practices to Balance CX and Security Oct 29, 2020
Berthold Kerl, Dr. Karsten Kinast: After Privacy Shield's Death: What Is Still Possible? Oct 28, 2020
Dr. Torsten Lodderstedt: eKYC: Seamless Customer Identification Using Existing Verified Digital Identities. Oct 28, 2020
Katryna Dow: Human-centric Data & Identity Management – Implementing Real World Case Studies Oct 28, 2020
Martin Kuppinger: The First Steps to CIAM: Verify Your Customer, Authenticate Your Customer Oct 28, 2020
Panel: Best Ways to Balance User Experience & Security for your Consumer Identity Management Strategy Oct 28, 2020
Gillan Ward: The Use of Real World Evidence (and Identities) in Support of Identity and Access Management Oct 02, 2020
Pavel Volosen: An Implementer’s Perspective to Traditional Identity Access Governance (IAG) vs Identity Acc... Oct 02, 2020
Alpha Barry: The Value of Identity Governance and Administration in Non-Regulated Companies Sep 18, 2020
Matthias Reinwarth: Beyond Static Access - Leveraging Access Policies To Deal With The Increasing Complexit... Sep 18, 2020
Mans Hakansson: Modernizing IAM - Implementing Policy Based Access Management & Governance Sep 18, 2020
Darran Rolls: Standing on the Beach, Looking at the Sea: Identity Governance & Administration, Today, Tomor... Sep 18, 2020
David Black: The Use of Real World Identities in Support of Identity and Access Management Sep 18, 2020
Mike Kiser: 13 Treasures in 81 Minutes: The Isabella Stewart Gardner Heist and Identity as the New Vermeer Sep 08, 2020
Loren Russon: Good Enough is Never Enough When Protecting Your Business Resources & Customer’s Data Sep 08, 2020
Designing and Establishing a Mature PAM Ecosystem for Reducing Risk in Your Organisation Sep 02, 2020
David Wishart: How to Solve the Top 5 Access Management Challenges in Hybrid Cloud Environments Aug 21, 2020
Analyst Chat #37: COVID Response and Decentralized Identity Solutions/Verifiable Credentials Aug 07, 2020
Adrian Doerk: Bringing Self-Sovereign Identity Into Practice: Lessons Learned from Lissi and the SSI for Ge... Aug 07, 2020
Analyst Chat #32: Data Management and Data Lineage - The Foundation for Big Data Governance and Security Jul 20, 2020
Interview: Implications of Recent Court Ruling on EU-US Data Protection Umbrella Agreement Jul 20, 2020
Didier Cohen: Forget About Complex PAM Projects: Now’s the Time for Quick, Easy and TCO-efficient Privilege... Jul 13, 2020
Martin Kuppinger: PAM: You're not alone. The interplay of PAM with Cybersecurity, IAM, and ITSM Jul 10, 2020
Mike Small: Cloud Backup and Disaster Recovery Why This Is an Essential Component of Digital Transformation Jun 22, 2020
Oliver Cheal, Paul D'Cruz: How Has the IT Security Roadmap Changed in 2020 for Businesses? Jun 22, 2020
The Future of Privileged Access Management and Reducing Risk for Modern Digital Enterprises Jun 19, 2020
Christopher Schuetze: Necessary Components of an Effective Cyber Supply Chain Risk Management (C-SCRM) Jun 09, 2020
Christopher Schuetze: Prepare & Invest Now – And Survive an Incident or a Breach Tomorrow Jun 08, 2020
Matthias Canisius: Return to Base | The CISO's Guide to Preparing A COVID-19 Exit Strategy Jun 08, 2020
Matthias Reinwarth: Optimizing Your Cybersecurity Spending: Where to Put Your Money During and After the Cr... Jun 08, 2020
Digital Identities & Healthcare IAM: Balancing Efficiency in Clinical Workflows and the Need for Security &... May 08, 2020
Modernizing IAM solutions leveraging new operating models with the KuppingerCole Identity Fabric Mar 12, 2020
Holen Sie sich das SIEM, das Sie schon immer wollten: intelligent, automatisiert, mit unbegrenzter Kapazität Feb 18, 2020