Event Recording

Exploring the role of Endpoint Security in a Ransomware Resilience Plan

Show description
Speaker
John Tolbert
Lead Analyst
KuppingerCole
John Tolbert
Background: John Tolbert is a Lead Analyst and Managing Director of KuppingerCole, Inc (US). As Lead Analyst, John covers a number of different research areas, outlined below. John also advises cybersecurity and IAM vendors, from startups to Fortune 500 companies, regarding their product and...
View profile
Playlist
Cybersecurity Leadership Summit 2022
Event Recording
New Security Fundamentals: Five Things CISOs and CTOs Should Consider
Nov 09, 2022

The old saying goes, ‘The more things change, the more they stay the same”. This has never been more true than today in the modern CTO and CISO’s life. As technology evolves, the attack surface and actors adapt. Are they really different? Or are they the same vulnerabilities that have always existed, surfacing in new vectors in the infrastructure? Here are five new fundamental areas to keep in mind as you fend off the modern attacks of old.

Event Recording
Resilience and the Need for Privacy
Nov 09, 2022

This presentation will explore the role of privacy in building enterprise resilience.

Event Recording
UNECE R 155: Security-by-Design for the Automotive Supply Chain and In-Vehicle Cybersecurity
Nov 10, 2022
Event Recording
Panel | Cyber Hygiene Best Practices: Why Does It Matter?
Nov 10, 2022

Security of users, data, devices and networks is orchestrated via a set of precautionary cyber measures called cyber hygiene. Enterprises today deal wih a sheer volume users, data and devices, often distributed across complex cloud/hybrid environments – making cyber hygiene monitoring a challenging task. In this session, leading cyber experts shed light on the importance of implementing effective cyber hygiene amidst an uncertain threat landscape and share best practices on how to do so.

Event Recording
R.O.N. - Return on Negligence – The Impact of Cybercrime
Nov 09, 2022

The cost of doing nothing is something that today we have to factor into many aspects of our lives.  Inaction hurts and we’ll briefly talk about the 6 degrees of separation for the connected areas that are impacted by Cybercrime.  There is more at risk than what can be solved by technology.

Event Recording
Security in the Face of Change: Past Lessons & Prospects for Our Future
Nov 09, 2022
The convergence of organizational decentralization, digitization, and global instability have raised the need to secure vital infrastructure. Can we learn from the past? Can we prioritize and plan future scenarios? 
Join Elastic as we share insights and lessons from building security products and evaluating them and gain ideas to plan your defense.
Event Recording
Workshop | Implementation of a Risk Class Model Within Access Management
Nov 09, 2022

In this workshop, we will show you how to implement a risk class-based approach within access management with little effort in order to achieve the highest level of control, compliance and transparency in your own organization. All the necessary rules and templates (e.g., for password management, connection guidelines for protocols used and authorizations) are based on best practices, the BSI risk class model and the requirements of ISO27001.

Event Recording
CISO Talk: Cloud as a Security Enabler
Nov 09, 2022

More organizations are now moving to the cloud.  From a security perspective – refactoring the applications provides a major opportunity to improve security posture.  This session explores how the right approach towards can save time, increase inherent security, and ensure apps are compliant.

Event Recording
Effects of Malware Hunting in Cloud Environments
Nov 10, 2022
Event Recording
Reducing Complexity – Introducing a Practical Model for Security Classifications
Nov 09, 2022

Building and running cyber security in both worlds modern cloud security in combination and legacy on premises introduces extra complexity.  Some of the well known security patterns and models are not applicable in cloud systems while the modern security models like zero trust barely  fit in legacy systems. Based on a model for security classification we will explore some does and don’ts in modern cyber security.

Event Recording
Workshop | Break the Kill Chain – An Intelligence-Led Model to Cyber Defence
Nov 09, 2022
Event Recording
Successfully tackling your Digital Supply Chain Risk
Nov 09, 2022

In this talk, Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will provide insights on Digital Supply Chain Risk. He will look at the areas of risks, from secure partner onboarding to software supply chain security and others. He will look at prominent examples and common weaknesses in these areas. He then will provide insight into actions that organizations should and must take, both organizational and technical.