KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.
Compare solution offerings and follow predefined best practices or adapt them to the individual requirements of your company.
Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.
Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.
Step into the future of cybersecurity in an engaging and enlightening keynote presentation featuring Jonathan Blanchard Smith from SAMI Consulting and Berthold Kerl, CEO of KuppingerCole. Join us as we unveil the outcome of extensive discussions with CISOs and cybersecurity experts, exploring the ramifications of SAFIRE scenarios on the digital realm.
The keynote commences with captivating short films that vividly illustrate the diverse future scenarios. Witness how technological advancements, societal shifts, economic fluctuations, environmental concerns, and political dynamics intertwine to shape the cyber landscapes of tomorrow.
Delve into thought-provoking discussions as we ponder the most effective means of safeguarding the future digital life for each scenario. Gain insights into the challenges and opportunities that lie ahead, and explore innovative approaches to bolstering cyber resilience in a rapidly evolving world.
By the end of this session, you will be equipped with a clearer vision of the future of cybersecurity. Embrace this unparalleled opportunity to comprehend the potential challenges and transformations that await us.
Don't miss this extraordinary keynote at cyberevolution, where groundbreaking minds converge to envision the digital frontier. Join us and embark on a journey to discover the cyber future that lies ahead.
Step into the future of cybersecurity in an engaging and enlightening keynote presentation featuring Jonathan Blanchard Smith from SAMI Consulting and Berthold Kerl, CEO of KuppingerCole. Join us as we unveil the outcome of extensive discussions with CISOs and cybersecurity experts, exploring the ramifications of SAFIRE scenarios on the digital realm.
The keynote commences with captivating short films that vividly illustrate the diverse future scenarios. Witness how technological advancements, societal shifts, economic fluctuations, environmental concerns, and political dynamics intertwine to shape the cyber landscapes of tomorrow.
Delve into thought-provoking discussions as we ponder the most effective means of safeguarding the future digital life for each scenario. Gain insights into the challenges and opportunities that lie ahead, and explore innovative approaches to bolstering cyber resilience in a rapidly evolving world.
By the end of this session, you will be equipped with a clearer vision of the future of cybersecurity. Embrace this unparalleled opportunity to comprehend the potential challenges and transformations that await us.
Don't miss this extraordinary keynote at cyberevolution, where groundbreaking minds converge to envision the digital frontier. Join us and embark on a journey to discover the cyber future that lies ahead.
Even before Russia`s war of aggression against Ukraine upended the international order it was clear that a new form of “hybrid conflict” had become the new normal. While it may seem obvious that cyber means have long played a decisive role in this new form of state aggression, both the actors, targets, and goals are often misunderstood. Instead of cyberwar the battle is often information war, the means are ransomwar rather than ransomware, and there are only two types of potential victims - those that know they are a target, and those that do not yet know. But there are positive developments as well, and boards and the c-level are likely to be more receptive to their CISOs in the future – if they can craft the right messages.
With the introduction of ChatGPT, we have entered into the knowledge age. In this new economy, CISOs are presented with new challenges. This session explores three concerns arising from capabilities like ChatGPT but also three opportunities that CISOs are well positioned for in this new knowledge economy.
Automated Threats to web applications are according to the Open Web Applications Project (OWASP) a misuse of their inherent valid functionality by applying automated means. Usually, those automations are referred to as `bots´. The attackers usually reverse engineer the web application, e.g. an e-commerce platform, and based on their discovery, craft bots to exploit vulnerabilities or gaps that allow them to pursue their goal on the platform in an undesirable way. A famous example are sneaker bots, whose goal is to obtain a competitive advantage over human clients in purchasing hyped articles like sneakers. Addressing automated threats is a company-wide effort and requires to tackle the problem from many angles reaching from DevSecOps, architectural changes, raising awareness, establishing transparency in the business, implementing preventive controls, to detective controls. In the first phase of our research, we tackled the problem in a big e-commerce company on this entire spectrum of challenges and are now at the position to enhance our approach in a second phase. In the second phase, we aim for an approach to harden a web-application platform with existing detective and reactive controls using aspects of generative approaches and adversarial attacks while also considering explainability.
In the talk, we are going to explain and motivate the problem space, explain the insights from the first phase and outline the goals of the second phase of our research.
In this presentation Paul Fisher connects the dots between Henry Ford, Stanley Kubrick and AI. He explains how AI is useless without good data and good data for cybersecurity can only be prepared with expert human help. The end is not nigh, instead the AI tools now coming will make our jobs easier while elevating cybersecurity to new levels.
Most contemporary digital identity discussions deserve another label: They are mostly about electronic trust ecosystems, considering all kinds of attributes beyond just pure identity. Additionally, nowadays they include natural persons, legal entities and (internet of) things. Everyone seems to agree the future is decentralized and all this only works with these curious wallets. Andre Kudra takes us on a journey through electronic trust ecosystems, diving into questions like: Which ones do we already have today? Some are successful, others not – why? Regulators are on it, too: What will eIDAS 2.0 and the EUDIW bring? What’s in the pipeline in other parts of the world? Will organizational digital identity (ODI) now invoke the breakthrough of decentralized identity overall? Why is decentralized identity the only way for Zero Trust Architectures which deserve the name?
The Elastic InfoSec team is responsible for securing Elastic’s globally distributed, remote-first workforce, and the planet scale, multi-cloud, Elastic Cloud platform.
Taking data driven approaches beyond the SIEM and applying them to the full scope of our InfoSec program, the resulting data fabric is the bedrock upon which insights, automation and AI can flourish. Learn how this approach has increased Elastic InfoSec visibility and enabled the team to distribute security responsibilities across the organisation, exponentially expanding our capability to protect Elastic from the threats of today and tomorrow, and establishing a robust foundation for AI implementation.
Artificial Intelligence is transforming how we live, work, and interact, bringing groundbreaking opportunities and notable challenges. As the influence of AI continues to grow, the pressing issues of governance and ethical considerations come to the forefront.
Martin, Scott, and Spray dive into this crucial discourse. Together, they will navigate the intricate landscape of AI regulations, exploring how to ensure these systems align with human values and societal standards. From the nuances of biases in decision-making algorithms to the broader societal implications of unchecked AI, the panelists will provide insights, debate solutions, and address the need for universally accepted ethical guidelines.
With diverse policy, ethics, and technology backgrounds, this panel promises a holistic overview of the ongoing challenges in AI governance. Attendees will gain insights into the path forward, ensuring AI serves humanity responsibly and ethically.
The side effects of (re)generative AI impacting cyber security
The polarizing public discussion about ChatGPT and its siblings and the smokescreens of those responsible for technology and business behind the brands obscure a differentiated view on the non-obvious side effects of a completely overheated Chatbot rally. This makes it difficult to seriously address the partially mutually dependent side effects of the large-scale public use of this technology.
Employers in particular are torn between giving in to the tempting benefits of this technology while, at the same time, they have to live up to their responsibility towards the law, regulations such as ESG, their organizations and their digital assets, the society and the duty of care towards their employees. All of that without missing a beat of innovation in that field.
In this workshop, we'll jointly explore the missing questions that need individual answers for a conscious, responsible and security aware use of AI.
In today's dynamic cybersecurity landscape, safeguarding sensitive data and infrastructure from insider threats, while effectively monitoring supply chain and third-party users, is paramount. This presentation delves into the critical intersection of Insider Threat Management and NIS2 compliance, anchored in a detailed case study of a company subject to NIS2 regulations. We will explore a diverse toolkit and industry best practices tailored not only for achieving compliance, but also for streamlining cybersecurity processes through robust technical controls. Attendees will gain invaluable insights into seamlessly integrating cutting-edge tools and proven methodologies, ensuring unwavering compliance with NIS2 regulations while fortifying your security posture.
When it comes to cybersecurity, many people focus on red/blue teams and technical measures such as servers, firewalls, encryption, and intrusion prevention systems. However, one crucial factor that is often overlooked is the human factor. All of these technical measures will count for nothing when it comes to matter of insider threats. Even the most robust cybersecurity measures can be rendered ineffective by social engineering threats.
In this keynote, I will present several use cases to demonstrate why it is essential to consider the human factor in any organization’s cyber threat landscape.
This interactive workshop will provide a practical approach to understanding and applying Zero Trust principles in creating your cybersecurity architecture.
We will focus on transitioning from traditional security perimeters to an identity-driven Cybersecurity Mesh, acting as the backbone for implementing the Zero Trust model. A detailed case study will guide you through the initial stages of incorporating Zero Trust principles into your current security landscape, identifying potential challenges, and offering methodical solutions.
The session will center on active learning through real-world examples, where participants will gain hands-on experience in shaping a resilient Cybersecurity Fabric. The workshop will conclude with participants developing a personalized roadmap to integrate Zero Trust principles into their cybersecurity systems seamlessly.
Join us to kickstart your Zero Trust journey, navigate its intricacies, and move towards a secure future with real-world applications and interactive problem-solving guidance.
The threat environment remains intense. Changing IT architectures present meaningful and operational risks for enterprises. Today’s cybersecurity market is highly fragmented. A number of trends including a shift towards platforms/suites are driving consolidation in cybersecurity. M&A is on top of the agenda for vendors as they seek to secure future growth and stay ahead of the innovation curve.