Webinar Recording

Best Practices and Essential Tools for GDPR Compliance

Show description
Speakers
Javvad Malik
Security Advocate
AlienVault
Javvad Malik
Javvad Malik is a London-based IT Security professional. Better known as an active blogger, event speaker and industry commentator who is possibly best known as one of the industry’s most prolific video bloggers with his signature fresh and light-hearted perspective on security. Prior to...
View profile
Mike Small
Information Security Management Advisor, Fellow Analyst
KuppingerCole
Mike Small
Mike Small is the retired director of security management strategy of CA, where he was responsible for the technical strategy for CA's security management software product line within Europe, Middle East and Africa. Mike did work for CA between 1994 and 2009, where he developed CA’s...
View profile
Lead Sponsor
AlienVault
Playlist
KuppingerCole Webinars
Webinar Recording
The Evolution of Secure Access in Critical Infrastructure
Oct 13, 2023

Join security experts from KuppingerCole Analysts and Cyolo as they discuss how access is evolving and the challenges that brings for OT/ICS/CIS environments. They will look at the potential benefits of technologies such as SIEM, SOAR, ITSM, PAM, IAM and XDR, and concepts such as MFA, ZTA, and ZTNA, as well as ways of reducing risk and meeting insurance requirements.

John Tolbert, Lead Analyst at KuppingerCole will give examples of threats to OT/ICS/CIS environments and the associated risks. He will describe how critical infrastructure differs from general IT, and how IT security tools can help protect it. He will also look at Zero Trust Network Access principles and how they apply.

Kevin Kumpf, Chief OT Strategist at Cyolo will explain the concept of application access, discuss a unified approach to using IT security tools, look at how these tools and process change can help address OT staff shortages, examine the impact of devices such as software PLCs on organizations, and explain how to achieve future-proof secure remote access.

Webinar Recording
Re-Imagining Identity Management for the Digital Era
Mar 10, 2023

Join identity and security experts from KuppingerCole Analysts and ARCON for a lively discussion about what exactly are the biggest identity challenges facing modern businesses, how those challenges are likely to evolve, and what could be done to meet current and future needs.

Participate in the debate between Martin Kuppinger, Principal Analyst at KuppingerCole Analysts and Gautam Singh Deo, Director - Strategic Business Engagements at ARCON as they discuss how to move beyond siloed approaches to ensure a security outcomes approach that is focused on identity.

Put your questions forward as our experts consider how best to achieve an identity-centric strategy that combines the best of Zero Trust, IAM, IGA and PAM, and as they explore the benefits of a converged identity security approach using Contextual Data Models.

Webinar Recording
Phishing-Resistant MFA: The Next Evolution for Strong Authentication
Apr 26, 2023

Join cybersecurity experts at KuppingerCole Analysts and workforce authentication firm Secret Double Octopus as they discuss the ways cyber-attackers are getting around MFA systems. They will also look at how organizations can better deploy MFA and go one step beyond to deliver strong security outcomes, thereby reducing risk, cost, and user friction.

Paul Fisher, Lead Analyst at KuppingerCole will look at why passwords persist despite their weaknesses, discuss the evolution and shortcomings of MFA, look at why attacks and losses continue despite the increased adoption of MFA, and explain the benefits and challenges of passwordless authentication.

Horacio Zambrano, CMO and Cyber Strategist at Secret Double Octopus will discuss what next generation authentication solutions look like, the current drivers of strong authentication, and the key considerations when choosing a passwordless authentication solution. These considerations illuminate how to best achieve success with these projects in today’s world of Zero Trust and hybrid workplaces.

Webinar Recording
Effective Application Access Controls in the Modern Business IT Landscape
Jul 19, 2023

Join security experts from KuppingerCole Analysts and Pathlock as they discuss why modern applications need more granular and context-based access controls, why it is important that these controls can adapt to changing business needs and user behaviors, and how that can be achieved.

Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will provide a head-to-head comparison of key features of common, traditional IGA, and the established access control tools for SAP and other Line of Business (LoB) applications.

Carrie Curry, VP of Customer Advisory at Pathlock will explain the benefits of a holistic application access management approach that can provide real-time access decisions based on contextual data, that can support compliance, that provides fine-grained controls, and that can reduce the cost and effort of access reviews. She will also discuss why organisations need to have a cross-system and application view when it comes to Access Governance.

Webinar Recording
Supercharge Your Access Control Capabilities With a New Approach
Dec 01, 2023

Join experts from KuppingerCole Analysts and Tuebora as they discuss how to make sense of the different approaches to access to control, the pros and cons of each, and how to make good decisions about managing access control throughout the access control landscape.

Nitish Deshpande, Research Analyst at KuppingerCole Analysts provides an overview of policy Based Access Control (PBAC), future of policies in identity management, security, and business advantages of adopting this approach to identity management.

Brian Iverson, Chief Product Officer at Tuebora explains why organizations need to take policies more seriously, with identity governance and administrative (IGA) technologies applicable to most of organizations’ application portfolios. He shows how to combine the best of PBAC and RBAC to reduce risk and maximize compliance.

Webinar Recording
Implementing Zero Trust With Privileged Access Management Platforms
Dec 16, 2022

Among the many approaches to do that, Zero Trust is one where organizations apply the principle of “never trust – always verify”. Since Zero Trust is not a single product or solution, implementing processes that work accordingly can be a challenge to IT teams that want to keep their privileged accounts safe. Modern Privileged Access Management (PAM) platforms can help with these challenges.

Paul Fisher, Lead Analyst at KuppingerCole will look at why standing privileges are a risk to modern multi-cloud and hybrid architectures and how Zero Trust can help in reducing standing privileges. Moreover, he will explain why advanced PAM platforms can assist with establishing a Zero Trust posture and how to move PAM to decentralized operations.

Joe Burke, Chief Architect, PAM, in the Symantec Identity Security Group, proposes organizations should rethink how to implement Zero Trust security for secrets, privileges, and privileged accounts. He will elaborate on factors that IT decision-makers should look for in Zero Trust-enabling PAM solutions. Among these are the time to implement, low operational overhead, scalability and performance, ecosystem integrability, as well as coarse and fine-grained authorization enforcement.

Webinar Recording
Are You Prepared for the True AD Disaster?
Nov 24, 2023

In this webinar, we will look at

  • Disaster Recovery planned right and done right – preparation is key to success
  • The central role of directory services for the entire IT
  • Events triggering the need for directory services DR
  • Planning for directory services / Microsoft AD DR: How to speed this up
  • What else is needed for a good DR planning

Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the challenges many organizations are experiencing in DR situations and how to overcome these. He will put this into the broader context of BCM (Business Continuity Management) and Incident Response Planning, but also shed a light on why Microsoft Active Directory remains essential here for most organizations.

Guido Grillenmeier, Principal Technologist at Semperis, and Evgenij Smirnov, Senior Solutions Architect at Semperis, then will drill down in the details of how to make Microsoft Active Directory Disaster Recover work, from plan to execution.

Webinar Recording
Schon perfekt vorbereitet für NIS2? Wenn nicht: warum Identity Governance so wichtig ist
Sep 06, 2023

Somit werden auch kleinere Unternehmen innerhalb von digitalisierten Lieferketten von NIS2 betroffen sein. Da eine Lieferkette immer nur so stark wie ihr schwächstes Glied ist, müssen sich alle Player innerhalb der Kette gegen die Risiken von Cyberangriffen schützen. Schlimmstenfalls kann sonst Industriespionage dazu führen, dass vertrauliche Informationen gestohlen, Produktionsanlagen gehackt oder der Informationsfluss und der Produktionsablauf gestört werden und so ganze Wirtschaftszweige lahmgelegt werden. Deshalb müssen Unternehmen jedweder Größe jetzt tätig werden und die Umsetzung der NIS2-Richtlinie einleiten.

KuppingerCole Principal Analyst Martin Kuppinger wird einleitend erklären, warum es NIS2 braucht und weshalb Organisationen sich frühzeitig damit auseinandersetzen und eine Identity-Roadmap erstellen sollten.

Klaus Hild, Principal Identity Strategist bei SailPoint, wird anhand von Beispielen darlegen, warum sich Unternehmen Gedanken über den „Lifecycle“ eines Mitarbeiters machen sollten, auch wenn dieser womöglich bereits das Unternehmen verlassen hat und wie Identity Governance and Administration (IGA) Lieferketten beeinflusst.

Abschließend wird Dr. Sven Hübner, Head of Consulting, Principal Consultant bei KOGIT GmbH, erläutern welche Relevanz NIS2 im Bereich der Lieferketten-Sicherheit hat und wie Projektkosten durch gezielte Planung kontrollierbar bleiben.

Webinar Recording
Cyber Resilience Through SOC Automation
Mar 08, 2023

Join experts from Kuppinger Cole Analysts and Palo Alto Networks as they discuss why automating as much as possible and providing information to enable analysts to make timely decisions should be a priority for SOC management. They will also explore the benefits of Security Orchestration, Automation & Response (SOAR) technologies.

Paul Simmonds, Fellow Analyst at KuppingerCole, will address the requirements of modern SOCs, highlighting the importance of automation and integration. He will focus on SOAR, discuss the top use cases and requirements of SOAR, and explain how it relates to other security technologies for a modern SOC such SIEM and XDR.

Amitabh Singh, Field CTO EMEA at Palo Alto Networks, will provide insights into Palo Alto Networks' XSOAR (eXtended SOAR) approach, its key capabilities, and its relevance to modern, highly automated SOCs. He will describe how XSOAR solutions can be used to augment existing SOCs or be used as a foundation for new SOCs, and how XSOAR relates to ASM, XDR, and XSIAM.

Webinar Recording
Simplify Identity Management With User Centric Personas and PBAC
Jun 23, 2023

Join experts from KuppingerCole Analysts and TrustBuilder as they discuss how to tackle these and other modern Identity Management challenges by using Policy-Based Access Controls and combining different personas into a single user profile to enable users to authenticate with a single set of credentials.

Nitish Deshpande, Research Analyst at KuppingerCole Analysts will examine the concept of Policy Based Access Control (PBAC), looking at what that entails, as well as the security and business advantages of adopting this approach to identity management.

Kurt Berghs, Product Manager at TrustBuilder will explain how using PBAC with personas consolidates multiple accounts across disparate systems into one user profile for each identity, enables the management of user lifecycles, secures complex environments, and allows organizations to delegate rights enabled with self-service.

Webinar Recording
Welcome to the Pamocracy!
Apr 19, 2023

In this webinar Lead Analyst and PAM specialist Paul Fisher will guide you through how this shift has happened, what it means for you organization, and how you can benefit from the Pamocracy. He will also explain how Privileged Access Management vendors and cloud providers have adapted to this new paradigm through innovation and addressing new market needs. It is a fascinating area of identity management that no business can afford to ignore.

As part of this webinar, Paul will introduce KC Open Select. The new online tool from KuppingerCole that helps buyers choose the right IT solutions, and how this will help you in choosing the best PAM solution.

Webinar Recording
Mastering Global IAM for Cybersecurity Excellence: From Zero Trust Principles to Identity Threat Detection & Response (ITDR)
Dec 08, 2023

Join this webinar to learn more about

  • Complex Digital Transformations: As organizations transition to digital platforms and embrace cloud technologies, the webinar will provide insights into how to navigate the complexities of identity management for a safer and more efficient digital transformation.
  • Missing Holistic Security Concept: Learn how to seamlessly integrate SaaS services into your security landscape while safeguarding critical assets in the cloud.
  • Integration of Legacy Systems: Understand the challenges posed by legacy systems and discover strategies for their seamless integration with modern IAM solutions, eliminating potential security vulnerabilities.
  •  Decentralized Work Environments: With the rise of remote work, we'll discuss strategies for ensuring secure access to company resources from diverse locations and devices, enabling you to adapt to the changing work environment securely.
  • Zero Trust Implementation: While the Zero Trust model is widely advocated, it can be intricate to implement. We will provide insights into the fundamental shifts required in organizational security strategies to successfully implement the Zero Trust approach.

Paul Fisher, Lead Analyst at KuppingerCole Analysts, will look at the requirements and market for ITDR and the role it plays in the Zero Trust context, but also its relationship to other DR technologies.

Andre Priebe, Chief Technology Officer at iC Consult, will share his knowledge and experiences to help you enhance your cybersecurity strategy, tackle global challenges, and stay ahead in the ever-evolving world of cybersecurity.