Event Recording

Panel | The Future of Cybersecurity Fabrics

Show description
Speakers
Victoria van Roosmalen
CISO & DPO
Coosto
Victoria van Roosmalen
Victoria van Roosmalen is focused on empowering a brighter future and navigates others towards informed and thoughtful actions by sharing her expertise in IT, cybersecurity, and privacy-related affairs. As a CISO & DPO, she drives the information security and privacy governance at...
View profile
Christopher Schütze
Cybersecurity Practice Director & CISO
KuppingerCole
Christopher Schütze
Christopher Schütze has been working as Director Practice Cyber Security and Lead Analyst for KuppingerCole Analysts AG since 2019. Prior to that, he was Head of Cloud Security at an auditing company and working at two integrators for identity and access management. He has provided clients...
View profile
John Tolbert
Lead Analyst
KuppingerCole
John Tolbert
Background: John Tolbert is a Lead Analyst and Managing Director of KuppingerCole, Inc (US). As Lead Analyst, John covers a number of different research areas, outlined below. John also advises cybersecurity and IAM vendors, from startups to Fortune 500 companies, regarding their product and...
View profile
Dirk Wahlefeld
Head of Presales EMEA & US
CYFIRMA
Dirk Wahlefeld
Dirk Wahlefeld is a proven technology leader, consistently applying his deep technical expertise and prowess to deliver tangible outcomes for partners and customers. Dirk has over two decades of cybersecurity experience and deftly blends his technical know-how with business acumen to help...
View profile
Dr. Donnie Wendt
Principal Security Researcher
Mastercard
Dr. Donnie Wendt
Dr. Donnie Wendt is a Principal Security Researcher for Mastercard. In this role, Donnie researches the latest security threats, technologies, products, services, and innovations to drive the company’s long-range security roadmap. He has worked at Mastercard for 18 years,  including...
View profile
Playlist
Managing Complexity: How to Define an Enterprise Cybersecurity Fabric That Delivers
Event Recording
How to use the ISO 27002:2022 to model and quantify cyber security risks
Event Recording
The Concepts and Technologies that Comprise Contemporary Cybersecurity Fabrics
Event Recording
Security Automation: Why and Why Not?
Event Recording
The Changing Cyber Threat Landscape – How to win the war against cybercriminals