Event Recording

Welcome to cyberevolution 2023

Show description
Speaker
Berthold Kerl
CEO
KuppingerCole
Berthold Kerl
Berthold Kerl, born 1960, studied economics at the University of Nürnberg and performs as CEO of KuppingerCole since 1 st July 2020. Before that he had been with Deutsche Bank AG for 17 years. As CIO he was working on major IT Transformation, IT Strategy, Change Management and Governance...
View profile
Playlist
cyberevolution
Event Recording
Thanks to AI, the Future of Security Is Collaborative
Nov 15, 2023

AI actors are poised to eclipse the number of human users on the internet. Many industry observers have decried such growth, pointing to the immense risks that such a brave new world poses. How can security systems even keep up with the rate of expansion in AI technologies? How can enterprises hope to compete with the vast amounts of money, time, and resources that AI companies use to train their models? Such questions presage a significant evolution in the way the tech industry envisions, develops, and deploys security systems.

Fortunately, there’s a way forward, but it requires the cybersecurity market to shift toward a pattern that follows what AI vendors have done: make the science of biological systems the template for cybersecurity. Breakthroughs in social science, political science, evolutionary biology, and neuroscience demonstrate that our focus should be on establishing trustful relationships rather than a direct reliance on structural interventions such as identity management, attack surface management, and zero trust practices. The pathways that enable biological entities to come to trust and successfully collaborate with each other are known to science. In this presentation, Global Head of Research Mike Neuenschwander will delve into what changes are coming to the security market in order to achieve such levels of trust online.  The presentation will provide a market roadmap for vendors, enterprises, governments, and standards organizations alike to create a security model that is highly collaborative and ultimately highly trustworthy.

Event Recording
AI Will Not Do the CISO's Job
Nov 16, 2023

As artificial intelligence continues its upward trajectory, a radical proposition emerges: Could AI take the helm of cybersecurity leadership? This bold discourse dives into the heart of this debate, exploring whether AI can effectively shoulder responsibilities traditionally assigned to a chief information security officer. Areas of exploration include AI's potential in threat detection, vulnerability assessment, and incident response.

But where does human judgment fit into this AI-dominated picture? Is the seasoned expertise of a CISO irreplaceable? This electrifying discussion stirs the pot of the future of cybersecurity leadership, grappling with the balance between emerging AI capabilities and indispensable human expertise.

Event Recording
Identity Security: Its Role for Succeeding in the Digital Journey
Nov 14, 2023

In his talk, Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the role of identity security for succeeding in the digital journey and its impact on secure journeys, convenient journeys, and digital enablement of the 3C - customers, consumers, and citizens. He will discuss the role of identity security, the perfect organizational setup, and the business impact of doing digital identity right and secure.

Event Recording
Unleashing Automated, Agentless Microsegmentation to Isolate the Next Breach
Nov 15, 2023

Discover the power of full-scale microsegmentation! Join us for an exciting presentation on this cutting-edge security solution that prevents lateral movement. Automated and agentless, effortlessly fortify your network against lateral movement attacks. 

Don't miss this opportunity to safeguard privileged protocols like RDP, SSH, and WinRM required by IT but loved by attackers. As a bonus, unlock the ability to MFA any port, protocol, or app. 

Deploys in one hour and protects your environment in just 30 days. Come see why Zero Networks was awarded “Best Global Startup” at GISEC & gain a competitive edge in today's rapidly evolving threat landscape. 

5 Takeaways:

1. Make a massive leap in your Zero Trust journey in just 30 days

2. Understand how auto-rule creation allows you to microsegment all your assets with little operational costs

3. Provide the ability to Just-in-Time MFA privileged protocols such as RDP, without the use of agents

4. Address 70%+ of the MITRE ATT&CK framework

5. Understand why Zero Networks is awarded the “Best Global Startup” at GISEC

Event Recording
Stop guessing about your Cyber Risk!
Nov 15, 2023

Cyber risk isn’t just a technical problem but a strategic one. Through Cyber Risk Quantification CISO’s are enabled to quantify the financial benefit of their cyber security strategy and are empowered to communicate with the Executive Board on eye-level and get the buy-in that you need. Join this session to learn how other companies are finally getting full transparency on their cyber exposure, ensuring not only they’re making the right investments in cyber security but also getting the right ROI of such investments.

Event Recording
Continuous Exposure Management – XM Cyber
Nov 14, 2023

A demo of the XM Cyber platform will show you how we can visualize the different attack paths in your system for you. We can show you how a hacker moves laterally through your environment using many different techniques to arrive at your critical assets. And by knowing the different attack paths through your environment, the platform will show you how you have to prioritize your efforts to prevent more attacks without getting lost in long lists of vulnerabilities.

Event Recording
Hacked! 72 Hours of a CISO's Nightmare
Nov 14, 2023

When the worst happens, and your defenses are breached, how do you respond? This engaging workshop, led by an experienced CISO, takes you through the crucial first hours of a cyber-attack. Using real-world examples and first-hand experience, the workshop highlights the immediate steps and strategies essential to mitigating damage and restoring operations. It provides insight into the tactical responses required during these stressful moments and offers guidance on how to create a robust response plan to prepare your organization better.

Attendees can expect to walk away with a better understanding of incident response management and benefit from the lessons learned from past attacks. This is a rare opportunity to learn from the trenches and equip your organization with the resilience it needs in the face of cybersecurity threats.

Event Recording
Secure Data Sharing in a Zero-Trust World
Nov 16, 2023

Zero trust is being embedded into law across the world enforcing privacy, data residency and consent. How do companies and governments share patient data global during a pandemic to measure the efficacy of a vaccine? How do financial services organisations share intelligence on suspected terrorist funding, money laundry or sanctions evasion? How is this achieved in the emerging world of data nationalism?

Developing a secure data sharing service is a complex proposition that need to embed change into operations.

Join this session to discuss:

  • Establishing a global secure data sharing service
  • Real world customer use case of the applications of Secure Data Sharing
  • How to supply AI models with the data required while respecting zero trust
Event Recording
Closing Keynote and Award Ceremony Capture The Flag
Nov 16, 2023
Event Recording
Protect APIs Everywhere with Modern Solutions
Nov 15, 2023

Attackers follow the money. In a digital economy, this means targeting web apps and APIs to exploit vulnerabilities and abuse business logic, leading to data breach, account takeover, and fraud that can devastate your business. To effectively prevent these attacks, you need  comprehensive, consistent security that protects your entire digital footprint.

F5 solutions reduce complexity in a hybrid and multi-cloud world so you can deliver secure digital experiences at scale—in the architecture you have now, and for the architecture you aspire to evolve your business into.

Event Recording
Adopting Insider Threat Management Best Practices for NIS2 Compliance
Nov 16, 2023

In today's dynamic cybersecurity landscape, safeguarding sensitive data and infrastructure from insider threats, while effectively monitoring supply chain and third-party users, is paramount. This presentation delves into the critical intersection of Insider Threat Management and NIS2 compliance, anchored in a detailed case study of a company subject to NIS2 regulations. We will explore a diverse toolkit and industry best practices tailored not only for achieving compliance, but also for streamlining cybersecurity processes through robust technical controls. Attendees will gain invaluable insights into seamlessly integrating cutting-edge tools and proven methodologies, ensuring unwavering compliance with NIS2 regulations while fortifying your security posture.

Event Recording
Panel | Improving the Security Posture with Cloud Solutions
Nov 16, 2023