KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.
Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.
Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.
Quantum computing has found its way into Deutsche Bahn's technology roadmap. In the session I’ll give an introduction where is it used, which use cases are being developed, which skills does the industry need? The key question is which risks do we expect and how can we prepare our organization against attacks, some keywords are NIST, PQC, crypto agility. I will give an overview of the international quantum landscape and its progress. You will get hands on advice how to establish a maturity model for quantum readiness and an enterprise program to become quantum ready.
The German railroad system is part of the national Critical Infrastructure, and hence all major train stations are fall under the KRITIS regulation. Recently, OT-(in)Security has drawn the attention of Threat Actors, and it is due time, to focus on securing Building Automation and Control system. The talk introduces to the challenges of managing a diverse and distributed technology landscape and how established solutions can help protect the infrastructure - or not...
This session provides palpable illustrations of the latest LLM technologies and hands-on suggestions on how to tackle the challenges arising from automated, emotionally aware, and generative AI prompted with malicious intent.
What will digital deception and trickery look like in the age where today’s youth become the standard bearers of our digital world? Times of e.g. required proof of personhood, predicted behavioural biometrics, and advanced data brokerage.
How are social engineering tools, tactics, and procedures evolving? What can we expect? And how can we prepare?
In this presentation, Emilie van der Lande, certified information privacy professional (CIPP/E) and certified by MIT in Artificial Intelligence’s implications on business and strategy, will explore prevention and detection tips to be a step ahead of the shifting paradigms of Cyber Deceptology.
In a world where everything and everyone is interconnected, traditional cybersecurity is outdated.
Zero Trust, a security framework that assumes nothing can be trusted implicitly, is the future.This presentation, "Zero Trust in a World of Everything, Everyone, Everywhere, All at Once," explores the fundamentals of Zero Trust and its relevance to our hyperconnected world.
The past weeks again have demonstrated that cybersecurity and geopolitics are inseparable. Cyber attacks have become a common element in geopolitical crisis as an additional vector for concrete attacks, but also for MDM (Misinformation, Disinformation, Malinformation). This also means that CISOs nowadays must take a broader perspective beyond technology. Geopolitics impact the cybersecurity of organizations, and organizations must adapt to this, both by adjusting their organizational structures and cybersecurity spendings as by extending their risk management approaches in a way that also helps in assessing the concrete cybersecurity impact of geopolitics.
Choosing the right software to meet your business needs today and in the future is both essential and challenging. Our workshop, "The Art of Choice," will guide you through five key areas of software selection:
Attendees will gain insight into software selection and decision making. Join us to deepen your understanding of "The Art of Choice" in software selection.
When the worst happens, and your defenses are breached, how do you respond? This engaging workshop, led by an experienced CISO, takes you through the crucial first hours of a cyber-attack. Using real-world examples and first-hand experience, the workshop highlights the immediate steps and strategies essential to mitigating damage and restoring operations. It provides insight into the tactical responses required during these stressful moments and offers guidance on how to create a robust response plan to prepare your organization better.
Attendees can expect to walk away with a better understanding of incident response management and benefit from the lessons learned from past attacks. This is a rare opportunity to learn from the trenches and equip your organization with the resilience it needs in the face of cybersecurity threats.
In today’s volatile cyber landscape, threats are increasingly sophisticated (e.g. AI-powered ransomware and data exfiltration techniques), and the regulatory environment is ever-changing. Now more than ever, the responsibility falls on executives to spearhead effective incident response plans. This fireside chat with industry leaders Navroop Mitter, Matthew Welling, and Evan Wolff, unpacks the complexities executives face around incident response in this new cyber-normal. The panel will delve into the intricate interplay between AI-driven threats, end-to-end encrypted communications, and new regulatory landscapes both in the U.S and Europe, particularly in the light of recent legislative developments like the U.K.'s Online Safety Bill.
We will also introduce our groundbreaking joint publication featuring specialized tabletop exercises designed for the C-suite.
Step into the future of cybersecurity in an engaging and enlightening keynote presentation featuring Jonathan Blanchard Smith from SAMI Consulting and Berthold Kerl, CEO of KuppingerCole. Join us as we unveil the outcome of extensive discussions with CISOs and cybersecurity experts, exploring the ramifications of SAFIRE scenarios on the digital realm.
The keynote commences with captivating short films that vividly illustrate the diverse future scenarios. Witness how technological advancements, societal shifts, economic fluctuations, environmental concerns, and political dynamics intertwine to shape the cyber landscapes of tomorrow.
Delve into thought-provoking discussions as we ponder the most effective means of safeguarding the future digital life for each scenario. Gain insights into the challenges and opportunities that lie ahead, and explore innovative approaches to bolstering cyber resilience in a rapidly evolving world.
By the end of this session, you will be equipped with a clearer vision of the future of cybersecurity. Embrace this unparalleled opportunity to comprehend the potential challenges and transformations that await us.
Don't miss this extraordinary keynote at cyberevolution, where groundbreaking minds converge to envision the digital frontier. Join us and embark on a journey to discover the cyber future that lies ahead.
The 2023 Cybersecurity Workforce Study identifies a daunting 4 million-person workforce gap. This shortfall in qualified candidates hampers industry growth. To tackle this challenge, the industry must broaden its recruitment scope, targeting individuals with potential to learn, including those from diverse backgrounds like business, arts, or engineering. Cultivating entry-level opportunities for students, young professionals, and career changers is vital for industry expansion. However, assessing cybersecurity aptitude in candidates without direct experience poses a challenge. Traditionally, the industry has lacked accessible entry points for newcomers. In this presentation, ISC2's CEO, Clar Rosso, advocates for a clear and adaptable pathway to cybersecurity careers, offering data-driven insights and strategies to ignite recruitment efforts and welcome new talent into the field.
Attackers don’t sleep and find new ways to get into a company and move laterally through the environment. This session starts with an overview where we come from and the pure reactive approach of detecting someone in our network and then moving into the proactive way of security. Using the same tools for asset discovery, risk assessment and automatic checks for compliance of the customers environment.
So the solution should not just stop the attack, but before check automatically how an attacker possibly could come in and have a full overview of the environment including automatic risk factors for assets and overview combined with integrations with other solutions.
Additionally the task of risk management is stated in the new NIS2 directive and should be clearly a topic for all companies that are affected.