Webinar Recording

Compliance als Vorteil: Technische Anforderungen der GDPR für moderne digitale Unternehmen

Show description
Speakers
Martin Kuppinger
Principal Analyst
KuppingerCole
Martin Kuppinger
Als Principal Analyst ist Martin Kuppinger verantwortlich für den Bereich KuppingerCole Research. In seiner 25-jährigen IT-Erfahrung hat er bereits mehr als 50 IT-Bücher geschrieben und ist ein etablierter Referent und Moderator bei Seminaren sowie Kongressen. Sein Interesse an...
View profile
Urs Zurbuchen
Senior Security Consultant
Airlock
Urs Zurbuchen
Urs Zurbuchen ist Senior Security Consultant bei Airlock. Als Engineer und Consultant für Design und Implementation von IT Security Lösungen kennt er die Anforderungen an sichere Digitalisierungsprozesse, In der Konzeption und Integration von Web Application Security Lösungen (Web...
View profile
Lead Sponsor
Airlock Suite
Playlist
KuppingerCole Webinars
Webinar Recording
Effective IAM in the World of Modern Business IT
Digital Transformation promises lower costs, and increased speed and efficiency. But it also leads to a mix of on-prem and cloud-based IT infrastructure, and a proliferation of identities that need to be managed in a complex environment. Organizations adopting a Zero Trust approach to security must find a way to overcome these challenges.
Webinar Recording
Urgent: Find and Block Identity-Centric Security Threats Today
The inability to deal with identity-centric cyber threats is one of the most critical issues facing modern enterprises. Attackers are increasingly targeting digital identities to gain unauthorized access to systems and data. Action is essential, but detecting unauthorized access is challenging.
Webinar Recording
Breaking the Ransomware Attack Chain
At some point, any business connected to the internet is likely to become a victim of a ransomware because they are relatively easy and inexpensive to carry out, but potentially yield large payouts for cybercriminals. The best way of tackling this threat is to know how to break the attack chain.
Webinar Recording
Evolving Identity and Access Management for the Digital Era
Businesses are undergoing digital transformations and adopting new technologies to become as flexible and agile as possible to remain competitive. But ensuring that only authorized entities have access to critical business data and applications is essential. Modern IT demands modern IAM that supports cloud adoption and business process optimization.
Webinar Recording
Cyber Resilience Through SOC Automation
Cyber resilience is now essential for the survival of every business, but identifying and responding to cyber threats quickly is challenging. Staff at many Security Operations Centers (SOCs) are struggling due to the high volume of security alerts, coupled with a shortage of cybersecurity talent. To address these issues, many companies are turning to automation.
Webinar Recording
Pioneering Zero Trust Network Access With Intelligent Microsegmentation
Working from anywhere and the adoption of cloud services from multiple providers have become increasingly common in the post-pandemic era, but this has created new opportunities for cyber attackers to enter and move across networks. A modern approach to network security is essential.
Webinar Recording
Why Network Detection & Response (NDR) Is Central to Modern Cyber Architecture
Cybercriminals are constantly refining their attack techniques, which renders traditional and static security approaches insufficient to detect cyber incidents. Therefore, organizations must adopt more dynamic and adaptive strategies to identify and respond to novel attack attempts across their networks.
Webinar Recording
Phishing-Resistant MFA: The Next Evolution for Strong Authentication
Using stolen credentials is one of the most popular and effective ways for cyber-attacks to infiltrate the IT systems of targeted organizations. Most cybersecurity teams are implementing multi-factor authentication (MFA), but not all MFA systems are created equal or implemented effectively, leaving organizations vulnerable to attack.
Webinar Recording
Don’t Delay, Get Ready for a New Digital World Today
Like many other countries, digitization is a strategic priority in Germany, where there is a concerted effort to digitize public services. German banks and insurance companies are also digitalizing their customer journeys. Other organizations need to do the same, or risk losing competitive advantage in the digital era.
Webinar Recording
Implementing Zero Trust With Privileged Access Management Platforms
There is no debate about the fact that ransomware is the fastest-growing kind of cybercrime. Due to their wide range of access rights and thus potential ransom leverage, privileged accounts are at the top of the target list for cybercriminals. Therefore, organizations need to pay special attention to securing these kinds of accounts.