Holistic Approach to Cyber Risk Governance in the GDPR Era

In order to watch this video, you have to log in or create an account, if you don't have one yet.
By continuing, you agree that the speakers of this event will have access to the video statistics.

Pressured by the Digital Transformation, corporate networks are becoming increasingly complex, spanning across multiple geographical locations and technology platforms. Unfortunately, even as companies are becoming more open to the outside world, different business units within the same company still remain essentially isolated when it comes to consistently measuring and exchanging security and risk management data across their networks.

Without full and clear visibility into the true company-wide risk posture, executives are bound to have massive difficulties understanding and communicating their current cybersecurity and compliance standing compared to their peers as well as the industry’s guidelines and best practices. Unprepared to address a potential data breach, they are inevitably going to face all the grim consequences, which, starting this May, are going to become very expensive.

Language: English • Duration: 01:01:26 • Resolution: 1920x1080

Learn more about this webinar

Latest Related Videos

More Related Videos

Webcast

Managing Risk in Ever-Changing As-a-Service Environments

In the infrastructure and platform-as-a-service worlds, application developers are the new infrastructure superstars. With concepts ranging from containers to infrastructure-as-code, we are experiencing a paradigm shift in how tightly coupled application code and the related infrastructure…

Webcast

Martin Kuppinger: Beyond SAP Security & SAP GRC: Reflecting the Changing Business Workloads

Defining strategies on governance, risk management, compliance, security, and identity beyond the SAP silo Business applications are under change. While some remain on-premises and in traditional architectures, others have shifted to the cloud – and several of these being provided…

Webcast

Arndt Lingscheid: How to Build a Strong Security and Compliance Foundation for Your SAP Landscape

Cyber-attacks can have severe consequences when it comes to SAP S/4HANA applications. These attacks increasingly focus on the company’s application layer and use privileged user accounts. Unfortunately, many security departments see the SAP application layer as a “black…

Webcast

Choosing the Right Fraud Reduction Intelligence Tool in a Digitally Evolving Economy

Fraud is a major cost to businesses worldwide and it is on the rise. In it’s 2019 annual report, the Internet Crime Complaint Center (IC3) put a specific focus on methods such as elder fraught, credit card fraud and confidence/romance fraud, emphasizing the growing occurrence of…

Stay Connected

KuppingerCole on social media

Next Webinar

Webinar

Maximizing the Benefits of Customer Identity & Access Management

CIAM solutions often come packed with features that could be used to improve consumer experiences, which is key to success in the digital era. However, in most cases, organizations that deploy CIAM products or use cloud-hosted CIAM services are under-utilizing the capabilities, which leads to poor customer experiences.

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00