Event Recording

Decoding the Consequences for Cybersecurity Using the 4 SAFIRE Scenarios of the Future

Show description
Speaker
CEO
KuppingerCole Analysts AG
Berthold Kerl, born 1960, studied economics at university of Nürnberg and performs as CEO of KuppingerCole since 1 st July 2020. Before that he had been with Deutsche Bank AG for 17 years. As CIO he was working on major IT Transformation, IT Strategy, Change Management and Governance...
View profile
Playlist
cyberevolution
Event Recording
Chain of Confidence: Ensuring Trustworthiness in Software Supply Chains
Nov 16, 2023

Paul Fisher delves into the multifaceted approach required to foster trustworthiness within complex software supply chains. This discussion begins by delineating the critical components of software supply chains and the potential risks associated with each link—from development and deployment to maintenance and decommissioning.

Key to establishing a chain of confidence is the adoption of transparent processes and tools that provide verifiable evidence of security at each step. The audience will be introduced to Software Bill of Materials (SBOM), cryptographic signing, and continuous integration/continuous deployment (CI/CD) pipelines fortified with automated security checks.

The talk will also consider the human aspect, emphasizing the need for cultivating a culture of security awareness and collaboration among stakeholders. This includes not only developers and security professionals but also suppliers, distributors, and end-users.
Finally, the talk will provide actionable insights and strategies for organizations to audit, monitor, and continuously improve their software supply chains.

Event Recording
Enabling the Power of Digitalization with Identity-Based Access Privileges
Nov 15, 2023

As organizations seamlessly navigate between on-premises, cloud-based, and offline resources while harnessing the power of AI, the need to verify and manage user identities with precision has never been more vital. Strong identity-based access to applications not only fortifies security by allowing organizations to grant privileges based on verified identities, buy it also enables real-time threat detection, compliance adherence, and adaptive scalability. You’ll always know with certainty who is connecting to what and what they’re doing while they’re connected. Join us to explore how this approach empowers modern hybrid organizations to strike the delicate balance between safety, security, user experience and the transformative potential of true digitalization.

Event Recording
Securing the Digital Frontier: Navigating EU Cybersecurity Regulation, NIS, and DORA
Nov 15, 2023

In today's interconnected European digital ecosystem, the importance of robust cybersecurity measures is more pronounced than ever. The Network and Information Security Directive and the Digital Operational Resilience Act emerge as pivotal landmarks in the EU's regulatory response to these challenges.

Event Recording
XM Cyber: From Vulnerability Management to Continuous Exposure Management
Nov 15, 2023
Event Recording
Cyber Risk Quantification – Challenges from a Risk Perspective
Nov 15, 2023

Modelling Cyber Risk is hard. Only a few historical data in known quality exist. Cyber Risks occur with a low frequency but their impact and severity might be high in case they come to pass. In my session I will give an inside how we got started to quantify Cyber Risks and what the challenges are to derive conclusions for risk steering and capital allocation.

Event Recording
Artificial Intelligence: A New Tool in the Hacker's Arsenal
Nov 15, 2023
Event Recording
Welcome to cyberevolution 2023
Nov 14, 2023

Welcome to the cyberevolution Conference Opening!

Berthold Kerl will kick off the cyberevolution Conference in Frankfurt from the 14th to the 16th of November. He will explain the idea behind "Anticipate - Innovate - Together," the triad that drives the future of cybersecurity. In today's rapidly evolving digital landscape, the role of AI in cybersecurity has never been more crucial. Throughout this opening, Berthold will explore the profound impact of AI on cybersecurity today and tomorrow, uncovering its potential to reshape defense strategies. Drawing on our expertise as a leading analyst firm in cybersecurity, KuppingerCole will share the trends and insights that demand your attention. These crucial themes will spark thought-provoking discussions, igniting anticipation for what defenders of cybersecurity must prepare for today and in the future.

During the conference, expect a dynamic agenda filled with thematic highlights, distinguished speakers, and interactive sessions. Our goal is to encourage active participation, collaboration, and discussions that enrich your knowledge and strengthen the collective defense against cyber threats. Moreover, be prepared to immerse yourself in a captivating and diverse range of events in our engaging framework. We've crafted a compelling and exciting program that complements the conference and ensures you make meaningful connections and lasting memories.

Let's embark on this transformative journey together at cyberevolution. Anticipate new possibilities, innovate to shape the future, and together, we'll empower cybersecurity defense for the challenges that lie ahead. 

Get ready for an exceptional experience!

See you at cyberevolution!

Event Recording
Panel | It all starts with the Endpoint
Nov 15, 2023

The panel will discuss the role of endpoint security in today’s world of WfA (Work from Anywhere), BYOD (Bring Your Own Device), and people commonly using multiple devices, as well as “beyond PC” and “beyond mobile” types of endpoints, including printers. How can efficient endpoint security become implemented, which are the obstacles, and how to overcome them? And which role does endpoint security play in the bigger picture.

Event Recording
Revealing Hidden Dimensions of Security Beyond Data Secrecy
Nov 14, 2023

The presentation will provide a framing to help attendees navigate the rapid transition from yesterday’s industrial age security paradigms to future approaches for sustaining reliable information systems.

The talk will identify 13 emerging non-technical information risk trends, ranging from human hallucination and cognitive narcissism to institutional paradigm collapse and perimeter fetishism to Capitalist power overreach (and several others) that are having current, real-world security impacts, but which remain unaddressed in cybersecurity strategies and deployments. 

Solutions will be suggested and explored across business, operating, legal, technical, social, political, economic, biological and even evolutionary pathways, offering a toolkit of options that attendees can immediately apply in their organizations’ security program. Specific strategies for managing, de-risking and leveraging near and long-term personal and professional interactions in this steep part of the curve of exponential change will be suggested.

Event Recording
Cyber and Law – Do's and Don’ts in the Cyber Crisis from a Legal Perspective
Nov 15, 2023

Hacked and what legally to do now? What are the most important steps and measures that companies should take to avert or minimise liability and reputational damage? Fabian Bauer will give exciting insights into the legal consulting practice and explain the essential legal do's and don'ts after a cyber-attacks.

Event Recording
DORA: What are the Main Challenges Facing the Financial Industry?
Nov 15, 2023

The Digital Operational Resilience Act (DORA), which entered into force on 16 January 2023 and will apply from 17 January 2025, aims to enhance the digital operational resilience of entities across the EU financial sector and to further harmonise key digital operational resilience requirements for all EU financial entities. DORA sets out uniform requirements for the security of network and information systems of companies and organisations operating in the financial sector as well as critical third parties which provide ICT (Information and Communication Technologies) services to them, such as cloud computing or data analytics services. DORA creates a regulatory framework on digital operational resilience, whereby all financial entities need to make sure they can withstand, respond to, and recover from all types of ICT-related disruptions and threats. These requirements are homogenous across the EU, with the core aim to prevent and mitigate cyber threats. DORA is complemented with several “regulatory technical standards (‘RTS’)” which give more details on requirements for cyber security.

As the whole DORA legislation cannot be presented in a short timeframe, I will focus on the part that is most important to ensure cybersecurity and the part that is the most interesting one for the audience, the RTS on ICT Risk Management Framework. I will give a quick overview and highlight the topics, which will bring the most workload to the industry. The biggest challenges will be in the areas of Asset Management, Operations Security, Network Security and Encryption.

Event Recording
Re-inventing risk management for artificial intellect
Nov 15, 2023

This presentation delves into the imperative task of redefining risk management in the era of Artificial Intelligence (AI). As AI reshapes industries, it also introduces unique risks and challenges. This abstract offers a glimpse into how traditional risk management approaches must evolve to effectively address the intricacies of AI-related uncertainties. Through real-world examples, it explores emerging concerns like algorithmic bias, privacy infringements, and unforeseen consequences. Attendees will gain insights into proactive strategies, including leveraging AI itself for risk assessment and mitigation. By the presentation's conclusion, participants will grasp the essential steps needed to navigate the uncharted territory of AI-driven risks, ensuring responsible and secure integration of this transformative technology.