Event Recording

Ask Just Anything

Speakers
Martin Kuppinger
Principal Analyst
KuppingerCole
Martin Kuppinger
Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, a leading analyst company for identity focused information security, both in classical and in cloud environments. Prior to KuppingerCole, Martin wrote more than 50 IT-related books and is known  as a widely-read columnist...
View profile
Christopher Schütze
Cybersecurity Practice Director & CISO
KuppingerCole
Christopher Schütze
Christopher Schütze has been working as Director Practice Cyber Security and Lead Analyst for KuppingerCole Analysts AG since 2019. Prior to that, he was Head of Cloud Security at an auditing company and working at two integrators for identity and access management. He has provided clients...
View profile
Playlist
Cybersecurity Leadership Summit 2022
Event Recording
Panel | Cyber Hygiene Best Practices: Why Does It Matter?
Nov 10, 2022

Security of users, data, devices and networks is orchestrated via a set of precautionary cyber measures called cyber hygiene. Enterprises today deal wih a sheer volume users, data and devices, often distributed across complex cloud/hybrid environments – making cyber hygiene monitoring a challenging task. In this session, leading cyber experts shed light on the importance of implementing effective cyber hygiene amidst an uncertain threat landscape and share best practices on how to do so.

Event Recording
Welcome to CSLS 2022
Nov 10, 2022
Event Recording
Strategic Approaches to Secure Industrial Control System Environments
Nov 10, 2022

 

Event Recording
Workshop | Implementation of a Risk Class Model Within Access Management
Nov 09, 2022

In this workshop, we will show you how to implement a risk class-based approach within access management with little effort in order to achieve the highest level of control, compliance and transparency in your own organization. All the necessary rules and templates (e.g., for password management, connection guidelines for protocols used and authorizations) are based on best practices, the BSI risk class model and the requirements of ISO27001.

Event Recording
Awareness?! How to Make It Work in a Low-Tech Environment
Nov 10, 2022
Event Recording
On the Charge: Securing the Energy Sector
Nov 10, 2022

The economic value represented by the energy industry makes utilities an attractive target for cybercriminals. An expansive attack surface coupled with strong interdependencies between physical and digital infrastructure makes utilities an interesting case study for cybersecurity implementation.

Jerry Onesti and Jochen Toesmann from EON highlights the impact of cyberthreats across the value chain of utilities and shares his insights on how to protect assets associated with cyber-sophisticated industries such as energy.

Event Recording
SASE v/s Zero Trust: Going Beyond Buzzwords
Nov 09, 2022

The concepts behind Zero Trust and SASE are not new, but recent developments in technological capabilities, changes in the way people are working, accelerated adoption of cloud and Edge computing, and the continued evolution of cyberthreats have resulted in both rising in prominence.  

As organizations seek to improve their security capabilities, many are evaluating Zero Trust and SASE to determine whether to adopt either, one, or both.  Join this session to understand what each can potentially deliver and the exact nature of the relationship between them.

 

Event Recording
Successfully tackling your Digital Supply Chain Risk
Nov 09, 2022

In this talk, Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will provide insights on Digital Supply Chain Risk. He will look at the areas of risks, from secure partner onboarding to software supply chain security and others. He will look at prominent examples and common weaknesses in these areas. He then will provide insight into actions that organizations should and must take, both organizational and technical.

 

Event Recording
Security Automation: Realizing Business Benefits, Without Adding Headcount
Nov 09, 2022

The next generation of cyber threats have arrived and there aren’t enough security people or budgets to handle the growing volume and complexity. This presentation will explore why organizations — and not just their security teams — need security automation. We will look at the reasons why security teams utilize SOAR (Security Orchestration, Automation, and Response) to keep pace with threats and technological innovations, without their organizations needing to add headcount. Learn how when the security team automates traditional Tier 1 work, the entire organization benefits - from upskilling staff to eliminating spend on managed services. This session draws from real-world European enterprises whose adoption of NextGen SOAR was the catalyst for fundamental security and organizational improvements.

Event Recording
Cyber Warfare - A Reality Check
Nov 10, 2022

Cyber Warfare and Disinformation have been heavily weaponized since Russia´s full-scale Invasion of Ukraine and even before, aiming at destabilizing the free part of the world. It is the "synergy of the evil" between cyber warfare and MDM (Misinformation, Disinformation, Malinformation) that is causing the potential for long term damages and risks for critical infrastructures, societies and businesses. What is it that we have to expect in the near and longer future? How can we prepare for the worse to come? Ksenia Iliuk will share with us her insights from now 8 years since the Krim Invasion and 8 months in the general Cyber and Information Warfare in Ukraine.  

Event Recording
Panel | Leadership Outlook: What Are the Key Attributes of the Next-Gen CISO?
Nov 09, 2022

In this exclusively curated panel session, top CISOs from across the world reflect on where they find themselves today, explore trends that will define the cyber ecosystem over the next decade and highlight the core attributes required for future CISOs to maneuver through the challenges brought about by the digital enterprise.

Event Recording
How a Shoemaker Stole the City Treasury and Ended up as a Social Engineering Legend
Nov 10, 2022

Cyber Security traditionally has been seen as the domain of Technology, with an expectation that the solution for cyber resilience has to be provided by IT – and we happily accepted this challenge and delivered numerous software and hardware solutions, design and development principles, policies and process controls.

However, as most successful cyber-attacks in recent time have started by targeting users with phishing emails or social engineering, raising awareness of their role in increasing cyber resilience is at least as important as providing “just a technical solution”.

This presentation will – based on example of a famous real robbery in Berlin – show how user awareness can become an important line of defence in cyber security.