Event Recording

Closing Keynote and Award Ceremony Capture The Flag

Speakers
Berthold Kerl
CEO
KuppingerCole
Berthold Kerl
Berthold Kerl, born 1960, studied economics at the University of Nürnberg and performs as CEO of KuppingerCole since 1 st July 2020. Before that he had been with Deutsche Bank AG for 17 years. As CIO he was working on major IT Transformation, IT Strategy, Change Management and Governance...
View profile
Prof. Dr. Sebastian Schlesinger
Professor of (Business) Computer Science (Infrastructure and Security)
Berlin School of Economics and Law (University of Applied Sciences)
Prof. Dr. Sebastian Schlesinger
Prof. Dr. Sebastian Schlesinger is a distinguished academic and tech professional with a remarkable career trajectory. Since 2022, he serves as a Professor of Business Computer Science, specializing in Infrastructure and Security, at the Berlin School of Economics and Law (University of Applied...
View profile
Christopher Schütze
Cybersecurity Practice Director & CISO
KuppingerCole
Christopher Schütze
Christopher Schütze has been working as Director Practice Cyber Security and Lead Analyst for KuppingerCole Analysts AG since 2019. Prior to that, he was Head of Cloud Security at an auditing company and working at two integrators for identity and access management. He has provided clients...
View profile
Playlist
cyberevolution
Event Recording
Tomorrow is already here: AI driven Identity Governance at your fingertips
Nov 16, 2023

Anomaly & outlier detection today is far beyond human capacities. Artificial intelligence has become an important technology in cybersecurity, as algorithms can solve many problems better and faster than humans. AI-Driven data intelligence automates the discovery, management, and control of all user access. This allows you to not only make better and faster access decisions, but also to quickly spot and respond to potential threats. It empowers every worker with correct and timely access when they need it, proactively engages business users to identify risky access, and helps security professionals intelligently create and maintain access models in today’s dynamic IT environment. After all, Identity Governance is not just about security. It is Trust and Reputation Management.

Event Recording
From Encryption to Extortion: The New Face of Ransomware Attacks
Nov 15, 2023

The surge in ransomware attacks has become one of our most pressing cybersecurity challenges. With attackers continuously adapting and refining their tactics, staying abreast of the latest developments and trends in this ever-evolving threat landscape is crucial.

Florian and Stefan explore the modern nuances of ransomware attacks in this panel. Discussions will revolve around cutting-edge techniques such as double extortion, where attackers deny access to data and threaten its public release, and the shift towards targeting operational technology, leading to real-world disruptions. Moreover, the panel will highlight the rise of decentralized ransomware models that utilize networks of affiliates and delve into the contentious debate around the ethics and implications of paying ransomware.

Beyond understanding the current ransomware landscape, attendees will be introduced to preventive measures, effective response strategies, and potential future trajectories of ransomware evolution. Join this insightful discussion to equip yourself with the tools and knowledge needed to navigate the complexities of ransomware in today's interconnected digital ecosystem.

Event Recording
The Art of Choice: A Guide to Informed Decision-Making
Nov 14, 2023

Choosing the right software to meet your business needs today and in the future is both essential and challenging. Our workshop, "The Art of Choice," will guide you through five key areas of software selection:

  1. Avoiding Hasty Decisions: Understand the risks of rushing and the value of thorough evaluation.
  2. Balancing Immediate Needs: Learn to weigh specific requirements against the broader organizational goals.
  3. Moving Beyond Current Practices: Emphasize the importance of innovation and not just sticking to what's familiar.
  4. Recognizing Universal Challenges: Discover that many challenges are common across sectors and the benefits of industry benchmarking.
  5. Setting Realistic Software Expectations: Grasp the true potential of software within a strategic framework.

Attendees will gain insight into software selection and decision making. Join us to deepen your understanding of "The Art of Choice" in software selection.

Event Recording
XM Cyber: From Vulnerability Management to Continuous Exposure Management
Nov 15, 2023
Event Recording
The Risk of Quantum for PKI and How to Handle It
Nov 15, 2023

Quantum computing has found its way into Deutsche Bahn's technology roadmap. In the session I’ll give an introduction where is it used, which use cases are being developed, which skills does the industry need? The key question is which risks do we expect and how can we prepare our organization against attacks, some keywords are NIST, PQC, crypto agility. I will give an overview of the international quantum landscape and its progress. You will get hands on advice how to establish a maturity model for quantum readiness and an enterprise program to become quantum ready.

Event Recording
Beyond the Now: Examining Emerging Trends in the Cybersecurity Landscape
Nov 16, 2023

The results of a comprehensive 2023 study by KuppingerCole will be presented, providing invaluable foresight into cybersecurity trends and threats anticipated for 2024. Based on in-depth research, the discussion will illuminate a series of predictions and prepare participants for the evolving cyber landscape.

The conversation will touch upon emerging trends, new threat vectors, potential vulnerabilities, and anticipated advancements in cyber defense strategies. Insights from this study will equip organizations to preemptively bolster their cyber defenses, enhance resilience, and navigate the forthcoming challenges of the cyber domain with confidence and competence.

Event Recording
AI Will Not Do the CISO's Job
Nov 16, 2023

As artificial intelligence continues its upward trajectory, a radical proposition emerges: Could AI take the helm of cybersecurity leadership? This bold discourse dives into the heart of this debate, exploring whether AI can effectively shoulder responsibilities traditionally assigned to a chief information security officer. Areas of exploration include AI's potential in threat detection, vulnerability assessment, and incident response.

But where does human judgment fit into this AI-dominated picture? Is the seasoned expertise of a CISO irreplaceable? This electrifying discussion stirs the pot of the future of cybersecurity leadership, grappling with the balance between emerging AI capabilities and indispensable human expertise.

Event Recording
Beyond Centralization: Enhancing Cybersecurity with Decentralized ID
Nov 16, 2023

In his talk, Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the concepts behind Decentralized ID and its current state. Based on that introduction, he will share his perspectives on how Decentralized IDs can improve the cybersecurity posture of organizations for different use cases, including workforce, business partners, customers, and citizens.

Event Recording
How to Minimize the Blast Radius of an Attack?
Nov 15, 2023

In this session we will explain how Philips reduced the attack surface and lateral movement with a potential security incident with Privileged Access Management for the cloud in a highly regulated environment.

Event Recording
Panel | Addressing Universal Digital Vulnerability with Modern Identity
Nov 15, 2023

The risk of being digitally vulnerable, or not being able to access basic services, affects us all. There can be no doubt that enhancing accessibility features across digital access journeys is tremendously important in helping people simply and safely connect with the digital world. But this doesn’t go far enough.

What you’ll learn from this session: How can adaptive, connected, and balanced digital identity go further in addressing universal digital vulnerability at the root, making sure no one gets left behind.

Event Recording
The Geopolitics of Cyberspace: Unraveling the Complexities of Cybersecurity
Nov 15, 2023

The past weeks again have demonstrated that cybersecurity and geopolitics are inseparable. Cyber attacks have become a common element in geopolitical crisis as an additional vector for concrete attacks, but also for MDM (Misinformation, Disinformation, Malinformation). This also means that CISOs nowadays must take a broader perspective beyond technology. Geopolitics impact the cybersecurity of organizations, and organizations must adapt to this, both by adjusting their organizational structures and cybersecurity spendings as by extending their risk management approaches in a way that also helps in assessing the concrete cybersecurity impact of geopolitics.

Event Recording
Building Your Cybersecurity Strategy with Emerging Security and Privacy Technologies
Nov 15, 2023

In this session, I will give an overview of a number of emerging security and privacy technologies, such as advanced cryptography (e.g., lightweight cryptography, post-quantum cryptography, etc.), privacy-enhancing technologies (e.g., confidential computing, zero-knowledge proof, etc.), and blockchain, and discuss why and how organizations should consider building their cybersecurity strategies with these emerging technologies.