Webinar Recording

Die Angriffsfläche Ihres Unternehmens aus den Augen eines Hackers

by Christopher Schütze
Show description
Speakers
Christoph Hirschmann IT Security Expert
Cybersprint
Christoph Hirschmann
Christoph Hirschmann ist IT-Sicherheitsexperte mit über 20 Jahre Erfahrung in der IT-Sicherheit in verschiedenen Fachbereichen. Vom techn. Consultant bei Nokia Internet Communications, über BSI Grundschutz und Atenschutzberatung bis zum Technical Account Manager bei der IBM. Hier...
View profile
Christopher Schütze Cybersecurity Practice Director & Chief Information Security Officer
KuppingerCole
Christopher Schütze
Christopher Schütze arbeitet seit 2019 als Director Practice Cybersecurity und Lead Analyst für die KuppingerCole Analysts AG. Zuvor war er Leiter der Cloud Security bei einer Wirtschaftsprüfungsgesellschaft und bei zwei Integratoren für Identitäts- und...
View profile
Playlist
KuppingerCole Webinars
Webinar Recording
You Deserve a Better Security Testing Experience
To remain competitive, businesses are embracing digital transformation, adopting cloud services and agile software development. But this is creating opportunities for attackers because most organizations lack the skills, knowledge, and expertise to match attackers’ ability to find and exploit vulnerabilities. There needs to be a shift in the way organizations conduct security testing.
Webinar Recording
Multi-Cloud Identity Governance 101
In an effort to cut costs, improve efficiencies, and cater for a mobile and remote workforce, businesses are adopting cloud services from multiple providers. This has created a host of challenges in managing identity and access across multiple clouds, and has introduced several risks that need to be addressed urgently.
Webinar Recording
The Machine Monitoring Mandate
Governments world-wide are increasingly worried about the social unrest that could result from a cybersecurity compromise of critical infrastructure. This has highlighted the fact that the underlying operational technology (OT) is often inadequately protected, and that this must change.
Webinar Recording
Maximizing the Benefits of Customer Identity & Access Management
CIAM solutions often come packed with features that could be used to improve consumer experiences, which is key to success in the digital era. However, in most cases, organizations that deploy CIAM products or use cloud-hosted CIAM services are under-utilizing the capabilities, which leads to poor customer experiences.
Webinar Recording
An Agile Approach to Customer Identity and Access Management (CIAM)
Business success in the digital era depends on delivering seamless and secure customer experiences. Failure to do so can easily result in abandoned shopping carts, fraudulent transactions, and regulatory fines. However, delivering exceptional experiences and keeping pace with the speed of business is challenging.
Webinar Recording
Taking the Risk Out of Key Digital Business Enablers: APIs
Application Programming Interfaces (APIs) are among the foundations of modern digital business. APIs are found everywhere due to a rapid growth in demand to expose and consume APIs to enable new business models and connect with partners and customers, but APIs are also a security risk that businesses can’t afford to ignore.
Webinar Recording
A DevSecOps Maturity Model for Secrets Management
Recent high-profile software supply chain attacks have highlighted the importance of security in the DevOps environment. But this can be challenging because DevOps teams are at the forefront of digital transformation and use agile techniques to deliver applications quickly, often not following traditional paths of identity management.
Webinar Recording
A Winning Strategy for Consumer Identity & Access Management
Success in digital business depends largely on meeting customers’ ever-increasing expectations of convenience and security at every touchpoint. Finding the best strategy to achieve the optimal balance between security and convenience without compromising on either is crucial, but can be challenging.
Webinar Recording
Multi-Cloud Permissions Management
Most businesses are adopting cloud services from multiple providers to remain flexible, agile, efficient, and competitive, but many do not have enterprise-wide control over and visibility of tens of thousands of cloud access permissions, exposing the enterprise to risk of security breaches.
Webinar Recording
Effective Cyber Risk Quantification Through Automation
Continual high-profile cyber incidents demonstrate beyond a doubt that cyber risks exist, but most organizations struggle to quantify cyber risk in a useful way. There is an urgent need for IT security leaders to find a common way to express cyber risk in monetary terms, that business leaders understand to enable effective risk management and security investment.