Event Recording

Elevate your Email Security: Advanced Protection for M365 using AI (plus a more efficient SOC/XDR)

Show description
Speaker
Alexander Peters
Senior SE Manager DACH
Mimecast Germany GmbH
Alexander Peters
Alexander Peters joined Mimecast in April 2021 as Sr. Manager of the Sales Engineers Team responsible for the DACH region with a focus on enterprise customers. Previously, he was responsible for the Presales Team in Germany (temporarily DACH) at Symantec (later Broadcom - Symantec Enterprise...
View profile
Playlist
cyberevolution
Event Recording
Navigating Cybersecurity: Market Size and Predictive Insights
Nov 15, 2023

In an increasingly technologically interconnected world, cybersecurity teams are the defenders of digital frontlines. Looking ahead to the future, this session dives into the dynamic landscape of cybersecurity, and investigates the market segments’ evolution within it. Many things impact your cybersecurity preparedness and plans, such as new attack patterns, evolution of cybercrime techniques, and emerging technologies. We will discuss industry forecasts until 2025 and how businesses step towards optimal cybersecurity.  

From AI driven decision-making to a massive amount of cybersecurity threats around the world, many events make fluctuations in the market, and whether you are a cybersecurity professional, an investor or passionate about IT security, this session will provide you valuable information about the current market sizes and the predictions until 2025.  

You will find this session not only informative, but full of valuable insights that will enlighten your journey to secure your organization 

Event Recording
Panel | AI in Cybersecurity
Nov 16, 2023
Event Recording
The Next Generation of Secure Access with Zero Trust
Nov 15, 2023

Learn how Netskope can deliver a seamless transition for implementing the next generation of Zero Trust protection with their award-winning SSE platform.

Event Recording
Building a successful vulnerability management service concept
Nov 15, 2023

Vulnerability Management is more then ever an important building block when it comes to early detection of issues to allow a proactive counter measure. This is only possible if various organizational areas work hand in hand starting from the information security strategy, over architecture, engineering, operations and the business side. This needs to be embedded in an according information security framework that defines the rules and requirements based on which the vulnerability management service is operated. However, this approach is only complete with an according target operating model that defines the various building blocks that contribute to a successful end-to-end service.

 

Event Recording
EDITH #DigiTalk „CVD – Embracing Ethical Hackers”
Nov 15, 2023

How can I effectively address cybersecurity vulnerabilities within my organization? Also, what are the implications of the Cyberresilience Act for this? EDITH, the European Digital Innovation Hub for Hesse, has extended an invitation to Dr. Steven Arzt, a cybersecurity expert from the Fraunhofer Institute for Secure Information Technology SIT, for a #DigiTalk session discussing best practices for Coordinated Vulnerability Disclosure.

Coordinated Vulnerability Disclosure (CVD) is the process with which ethical hackers report vulnerabilities in software and systems to manufacturers and system operators. Researchers commonly often assess the security status of a system or product independently, i.e., without a formal invitation, contract or integration into a company’s strategy. While these unasked-for vulnerability reports are still considered an insult by some companies, others openly embrace their value for strengthening the company’s IT security by interacting with the hacking and research communities. In his talk, Dr. Arzt shows how a proper CVD process can greatly benefit companies and the wider IT security community at the same time. It is shown how CVD can not only help identify and fix vulnerabilities, but also send a strong positive message about a company’s attitude towards IT security.

Event Recording
Chain of Confidence: Ensuring Trustworthiness in Software Supply Chains
Nov 16, 2023

Paul Fisher delves into the multifaceted approach required to foster trustworthiness within complex software supply chains. This discussion begins by delineating the critical components of software supply chains and the potential risks associated with each link—from development and deployment to maintenance and decommissioning.

Key to establishing a chain of confidence is the adoption of transparent processes and tools that provide verifiable evidence of security at each step. The audience will be introduced to Software Bill of Materials (SBOM), cryptographic signing, and continuous integration/continuous deployment (CI/CD) pipelines fortified with automated security checks.

The talk will also consider the human aspect, emphasizing the need for cultivating a culture of security awareness and collaboration among stakeholders. This includes not only developers and security professionals but also suppliers, distributors, and end-users.
Finally, the talk will provide actionable insights and strategies for organizations to audit, monitor, and continuously improve their software supply chains.

Event Recording
Beyond Centralization: Enhancing Cybersecurity with Decentralized ID
Nov 16, 2023

In his talk, Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the concepts behind Decentralized ID and its current state. Based on that introduction, he will share his perspectives on how Decentralized IDs can improve the cybersecurity posture of organizations for different use cases, including workforce, business partners, customers, and citizens.

Event Recording
Unmasking the Dragon's Byte: Exploring Cybersecurity Risks in the China Context
Nov 15, 2023

When doing business in China, there are unique cybersecurity risks and complexities to consider. Experts in this field discuss these challenges in depth, pointing out potential vulnerabilities and strategies for prevention. The conversation covers topics such as China's cyber laws, the difficulties of technology collaboration, risks to intellectual property, and the importance of strong risk management strategies.

Additionally, the panel will explore how the business environment in China is changing and provide advice on how companies can secure their digital presence while striving for success in this market. The insights gained from this panel are invaluable for organizations looking to safely navigate this complex terrain.

Event Recording
The Art of Choice: A Guide to Informed Decision-Making
Nov 14, 2023

Choosing the right software to meet your business needs today and in the future is both essential and challenging. Our workshop, "The Art of Choice," will guide you through five key areas of software selection:

  1. Avoiding Hasty Decisions: Understand the risks of rushing and the value of thorough evaluation.
  2. Balancing Immediate Needs: Learn to weigh specific requirements against the broader organizational goals.
  3. Moving Beyond Current Practices: Emphasize the importance of innovation and not just sticking to what's familiar.
  4. Recognizing Universal Challenges: Discover that many challenges are common across sectors and the benefits of industry benchmarking.
  5. Setting Realistic Software Expectations: Grasp the true potential of software within a strategic framework.

Attendees will gain insight into software selection and decision making. Join us to deepen your understanding of "The Art of Choice" in software selection.

Event Recording
Cyber and Law – Do's and Don’ts in the Cyber Crisis from a Legal Perspective
Nov 15, 2023

Hacked and what legally to do now? What are the most important steps and measures that companies should take to avert or minimise liability and reputational damage? Fabian Bauer will give exciting insights into the legal consulting practice and explain the essential legal do's and don'ts after a cyber-attacks.

Event Recording
Building Your Cybersecurity Strategy with Emerging Security and Privacy Technologies
Nov 15, 2023

In this session, I will give an overview of a number of emerging security and privacy technologies, such as advanced cryptography (e.g., lightweight cryptography, post-quantum cryptography, etc.), privacy-enhancing technologies (e.g., confidential computing, zero-knowledge proof, etc.), and blockchain, and discuss why and how organizations should consider building their cybersecurity strategies with these emerging technologies.  

Event Recording
Zero Trust in a World of Everything, Everyone, Everywhere, All at Once
Nov 16, 2023

In a world where everything and everyone is interconnected, traditional cybersecurity is outdated.

Zero Trust, a security framework that assumes nothing can be trusted implicitly, is the future.This presentation, "Zero Trust in a World of Everything, Everyone, Everywhere, All at Once," explores the fundamentals of Zero Trust and its relevance to our hyperconnected world.