KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.
Compare solution offerings and follow predefined best practices or adapt them to the individual requirements of your company.
Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.
Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.
Matthias offers a critical analysis of the EU's NIS2 Directive's intricate demands, drawing attention to the limitations of one-size-fits-all solutions. He advocates for customized compliance plans, underscoring the unique challenges across various entities, with special attention to the constraints faced by SMEs. And obviously the future interpretation of this EU directive into national regulation adds another layer of complexity.
Essential strategies such as comprehensive risk evaluations, continuous educational efforts, and advanced incident management protocols are emphasized as crucial for effective compliance, integrating cybersecurity deeply into the organization's core values beyond just adherence. The talk concludes with a perspective that views NIS2 compliance as a dynamic goal necessitating enduring dedication and flexible approaches.
As artificial intelligence continues its upward trajectory, a radical proposition emerges: Could AI take the helm of cybersecurity leadership? This bold discourse dives into the heart of this debate, exploring whether AI can effectively shoulder responsibilities traditionally assigned to a chief information security officer. Areas of exploration include AI's potential in threat detection, vulnerability assessment, and incident response.
But where does human judgment fit into this AI-dominated picture? Is the seasoned expertise of a CISO irreplaceable? This electrifying discussion stirs the pot of the future of cybersecurity leadership, grappling with the balance between emerging AI capabilities and indispensable human expertise.
Immerse yourself in an in-depth exploration of the strategies of incident management. Through critical examination of real-world cases and emerging trends, they illuminate the integral stages of effective incident response. The dialogue underscores the importance of strategic foresight, seamless communication, and constant progress, providing indispensable insights to strengthen cyber defenses and build resilience. This discussion ensures a compelling exchange of knowledge and tactics, serving as an indispensable tool for organizations in the ever-evolving landscape of cybersecurity threats.
The results of a comprehensive 2023 study by KuppingerCole will be presented, providing invaluable foresight into cybersecurity trends and threats anticipated for 2024. Based on in-depth research, the discussion will illuminate a series of predictions and prepare participants for the evolving cyber landscape.
The conversation will touch upon emerging trends, new threat vectors, potential vulnerabilities, and anticipated advancements in cyber defense strategies. Insights from this study will equip organizations to preemptively bolster their cyber defenses, enhance resilience, and navigate the forthcoming challenges of the cyber domain with confidence and competence.
Picture this: your defenses are breached, and chaos ensues. What's your next move? In this engaging keynote address, led by an experienced CISO, we explore those crucial first hours in the wake of a cyber-attack. Through gripping real-world tales and firsthand insights, this keynote sheds light on the immediate steps and vital strategies necessary to minimize damage and restore normalcy. Discover the on-the-ground responses needed during high-stress moments and gain valuable guidance on crafting a resilient response plan for your organization.
Modelling Cyber Risk is hard. Only a few historical data in known quality exist. Cyber Risks occur with a low frequency but their impact and severity might be high in case they come to pass. In my session I will give an inside how we got started to quantify Cyber Risks and what the challenges are to derive conclusions for risk steering and capital allocation.
Most contemporary digital identity discussions deserve another label: They are mostly about electronic trust ecosystems, considering all kinds of attributes beyond just pure identity. Additionally, nowadays they include natural persons, legal entities and (internet of) things. Everyone seems to agree the future is decentralized and all this only works with these curious wallets. Andre Kudra takes us on a journey through electronic trust ecosystems, diving into questions like: Which ones do we already have today? Some are successful, others not – why? Regulators are on it, too: What will eIDAS 2.0 and the EUDIW bring? What’s in the pipeline in other parts of the world? Will organizational digital identity (ODI) now invoke the breakthrough of decentralized identity overall? Why is decentralized identity the only way for Zero Trust Architectures which deserve the name?
Fraud is a major cost to businesses worldwide. Banking, finance, payment services, and retail are some of the most frequent targets of fraudsters. However, insurance, gaming, telecommunications, health care, cryptocurrency exchanges, government assistance agencies, travel and hospitality, and real estate are increasingly targeted as cybercriminals have realized that most online services trade in monetary equivalents. After years of being the focus of cybercriminals, banking and financial institutions are more likely to be better secured than other industries, meaning that fraudsters are increasingly likely to attack any potentially lucrative target if given the opportunity. Fraud perpetrators are continually diversifying and innovating their Tactics, Techniques, and Procedures (TTPs).
The most prevalent types of fraud businesses, non-profit organizations, and government agencies experience today are:
Account Takeover (ATO) Fraud - occurs when fraudsters use breached passwords, phishing, social engineering and credential stuffing attacks to execute unauthorized transactions.
Account Opening (AO) Fraud – also called New Account Fraud or Synthetic Fraud, often happens as a result of using stolen identities or assemblages of personal information to create synthetic digital IDs.
In this session we will provide an overview of Fraud Reduction Intelligence Platforms and show the highlights of our latest research in this area.
In today’s volatile cyber landscape, threats are increasingly sophisticated (e.g. AI-powered ransomware and data exfiltration techniques), and the regulatory environment is ever-changing. Now more than ever, the responsibility falls on executives to spearhead effective incident response plans. This fireside chat with industry leaders Navroop Mitter, Matthew Welling, and Evan Wolff, unpacks the complexities executives face around incident response in this new cyber-normal. The panel will delve into the intricate interplay between AI-driven threats, end-to-end encrypted communications, and new regulatory landscapes both in the U.S and Europe, particularly in the light of recent legislative developments like the U.K.'s Online Safety Bill.
We will also introduce our groundbreaking joint publication featuring specialized tabletop exercises designed for the C-suite.