Event Recording

Reducing the Species in your Cybersecurity Zoo

Martin Kuppinger
Principal Analyst
Martin Kuppinger
Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, a leading analyst company for identity focused information security, both in classical and in cloud environments. Prior to KuppingerCole, Martin wrote more than 50 IT-related books and is known  as a widely-read columnist...
View profile
Christopher Schütze
Cybersecurity Practice Director & Chief Information Security Officer
Christopher Schütze
Christopher Schütze has been working as Director Practice Cybersecurity and Lead Analyst for KuppingerCole Analysts AG since 2019. Prior to that, he was Head of Cloud Security at an auditing company and working at two integrators for identity and access management. He has provided clients...
View profile
Top related content
Event Recording
Creating the Identity Driven Cybersecurity Mesh Architecture
May 11, 2023

In overcoming the ancient concept of firewalled enterprise perimeters, securing identities has become the core element of a future driven Cybersecurity Mesh Architecture, with a composable approach of interconnected security controls – the Cybersecurity Fabric.
These Cybersecurity Meshes or Fabrics factually are nothing else than the concrete architecture and implementation of the Zero Trust paradigm, making this work in practice. In this session, we will start with a quick overview of these paradigms and their constituents, before showing how to adapt this to your current state of cybersecurity and your concrete cybersecurity requirements. Based on that, we will look at examples of such concrete architectures, the maturity levels, and on how to build your own roadmap towards the cybersecurity mesh/fabric that makes Zero Trust a reality.

Event Recording
Reducing Complexity – Introducing a Practical Model for Security Classifications
Nov 09, 2022

Building and running cyber security in both worlds modern cloud security in combination and legacy on premises introduces extra complexity.  Some of the well known security patterns and models are not applicable in cloud systems while the modern security models like zero trust barely  fit in legacy systems. Based on a model for security classification we will explore some does and don’ts in modern cyber security.

Event Recording
Matthias Reinwarth: Optimizing Your Cybersecurity Spending: Where to Put Your Money During and After the Crisis?
Jun 08, 2020
Event Recording
Workshop | Move your Active Directory to the Cloud
Sep 16, 2021
Martin Kuppinger, Principal Analyst, KuppingerCole
Patrick Parker, Founder and CEO, EmpowerID
Matthias Reinwarth, Lead Advisor & Senior Analyst, KuppingerCole
Webinar Recording
Maximizing Cyber Security Investments in Economically Turbulent Times
Apr 28, 2023

Join security and business experts from KuppingerCole Analysts and Cyfirma as they discuss the challenges of ensuring an effective cyber defense strategy on a limited budget. They will then look at how to meet those challenges by applying insights gained from combining threat intelligence with attack surface discovery, digital risk protection, and analytics supported by machine learning.

John Tolbert, Lead Analyst at KuppingerCole Analysts will talk about the current cyber threat landscape and the need to shift the focus to preventing attacks using the MITRE ATT&CK approach. He will also provide an overview of some of the main components of modern security architectures, including attack surface management (ASM).

Dirk Wahlefeld, Head of Presales EMEA & US at Cyfirma will explain how external threat landscape visibility can help to validate your security controls, get the most out of existing cybersecurity assets, and shift from a reactive to a proactive cybersecurity strategy. He will also give an overview of Cyfirma’s external threat landscape management platform.

Webinar Recording
Cybersecurity Budgeting 2020: Set Your Priorities Right
Sep 26, 2019

For the majority of businesses, the budgeting season is about to start. Some are done, some will be later, if the fiscal year differs from the calendar year. But usually, in September and October, this process is kicked off. Cybersecurity is one of the areas where virtually every business will need to invest, with ever-growing cyber risks and ever-tightening regulations. On the other hand, budgets always are tight and most businesses already have a zoo of different cybersecurity tools. Thus, it might be even worth considering retiring some and focus on the ones that really help mitigating the cyber risks.

KuppingerCole as an analyst company is constantly analyzing the trends and evolutions in cybersecurity. However, KuppingerCole also has an advisory business with proven and lean methods that can help businesses creating a well-thought-out cybersecurity project portfolio for 2020.

Event Recording
Workshop | Your Path to Ransomware Resilience
Nov 09, 2021

Ransomware Attacks have become the biggest single cyber risk for enterprises of any size and industry. Current surveys and KuppingerCole´s own research indicate a steep rise not only in the number of attacks, but as well in the average damage  per incident. The dark side of digital is industrializing itself, turning ransomware into big business The question is no longer if and when your organization will be attacked, but whether and how successful the attackers will be. “Sophisticated recent ransomware attacks are fully aware of standard backup strategies and corrupt or destroy your one and only option to recover without paying the ransom.” says KuppingerCole´s Cybersecurity Lead Christopher Schütze.  “The complexity of today´s multicloud environments require more than traditional backup & restore approaches” he continues.

In this workshop, we will provide you with an overview on the pillars of a proactively resiliient IT Infrastructure. Starting with an individual ransomware resilience assessment, each participant will (individually and anonymously) benchmark the resilience of her organization against ransomware attacks, relative to the average value of the whole group that conducted the assessment. The key topics of this workshop will be:

  1. The state of ransomware, from a business and a technical perspective
  2. The ransomware attack surface 
  3. Ransomware Resiliency Essentials: Preparation 
  4. Ransomware Resiliency Essentials: Protection
  5. Ransomware Resiliency Essentials: Response 
  6. Ransomware Resiliency Essentials: Recovery 
  7. Your individual ransomware risk and what to do now
Event Recording
The Art of Choice: A Guide to Informed Decision-Making
Nov 14, 2023

Choosing the right software to meet your business needs today and in the future is both essential and challenging. Our workshop, "The Art of Choice," will guide you through five key areas of software selection:

  1. Avoiding Hasty Decisions: Understand the risks of rushing and the value of thorough evaluation.
  2. Balancing Immediate Needs: Learn to weigh specific requirements against the broader organizational goals.
  3. Moving Beyond Current Practices: Emphasize the importance of innovation and not just sticking to what's familiar.
  4. Recognizing Universal Challenges: Discover that many challenges are common across sectors and the benefits of industry benchmarking.
  5. Setting Realistic Software Expectations: Grasp the true potential of software within a strategic framework.

Attendees will gain insight into software selection and decision making. Join us to deepen your understanding of "The Art of Choice" in software selection.

Event Recording
Assessing your Cybersecurity Tools Portfolio: Optimize Cost, Increase Security
Nov 10, 2022

Most organizations don’t suffer from a lack of cybersecurity tools. They suffer from the cost and administrative burden of running too many of these. They suffer from the lack of integration. They suffer from the lack of skills in optimally configuring the tools and analyzing the data.

Couldn’t less be more? But what is the right answer? Just retiring some tools? Consolidating to new solutions such as XDR? Replacing old tools with the newest best-of-breed solutions?

As always, best start with a plan, and with defined methods to evaluate the contribution of the various tools you have to your targets. The plan must help you in understanding which elements you need most for protecting your IT. On the other hand, you must understand how well your existing tools landscape contributes to this.

In his talk, Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will unveil methodologies that can help you in assessing your cybersecurity tools portfolio, and that can help you in deciding about where to invest next.