Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Expertise & market knowledge in all relevant decision-making processes
Learn more how we can support you in the definition of future IT strategies
Sell-side and business-side advisory, research syndication and events
Take advantage of our Networking and Advisory Opportunities to be one step ahead
Register for our live Webinars - it's free
Watch previous webinar recordings & session videos from our live events
How to Stop Attacker Movement in Your Network Before They Reach your “Crown Jewels”Sep 12, 20194:00pm CEST, 10:00am EDT, 7:00am PDT
Register now for free
Learn more about our Sponsorship Opportunities
Keep up to date with all major news about our company, events and projects
Learn more about our newsletters
Subscribe for free
How to Train Your AI to Mis-Identify Dragons
Please use your KuppingerCole account to log in or
create one, if you don't have it yet.
For many years complying with government standards and industry regulations has been seen as a check box in the lengthy list of IT security tasks.
However, most recent changes in the ecosystem (e.g., increased cyber security threats) have led to a rethinking of this approach. More and more organizations realize that instead of looking at Governance, Risk, and Compliance from a centralized perspective, it is more efficient to let business operations drive these efforts as that's where the organization's risk knowledge resides. Join this webcast where we reveal how to tackle risk and its associated controls by business unit and how to automate your efforts.
Language: English • Duration: 57:01 • Resolution: 800x600
Executive View: Kaspersky Endpoint Security for Business - 80180
Whitepaper: ForgeRock Identity Platform for PSD2 & API Security - 80049
Leadership Compass: Database and Big Data Security - 79015
OT, SCADA, & ICS Security
Blockchain & Distributed Ledgers
Life Management Platforms
Real Time Security Monitoring & Intelligence
Privileged Access Management
Privacy and Consent Management
Artificial Intelligence and Machine Learning