Webinars

Upcoming Webinars

Webinar

GDPR as opportunity to build trusted relationships with consumers

The new regulations of the EU GDPR apply not only to companies in the EU but every organization dealing with the personally identifiable information of EU citizens. This means most enterprises across the world will be impacted when compliance is required on May 25, 2018. More

Webinar

Blockchain - How to Separate the Hype from Reality

Blockchain has taken the world by storm since the inception of Bitcoin. While the primary interest has been in the financial and insurance industry sector Blockchain technology has wider application. This webinar will describe the technology and separate the hype from reality, looking at some innovative Blockchain applications from identity management to the Internet of Things. More

Webinar

Personal data breach and the GDPR – Prevention, Detection and Notification

The general data protection regulation (GDPR) as issued by the European Union will be a major challenge for literally any organisation doing business in Europe. In roughly 15 months from now it will reach legally binding status in every country within the European Union. And beyond: Probably one of the most striking characteristics of the new regulation that is constantly underestimated is the scope of its applicability. It actually applies in all cases where the data controller or the data processor or the data subject is based in the EU. This includes all data processors (e.g. cloud service More

Webinar

Creating Secure and Unified Next Generation Workspaces

A key challenge in every organization is making sure that the right tools are available, in the right place, at the right time, for the right people. The continual on and off boarding of large groups of employees, external workforces or partners creates increased pressure on administrative teams within an organization. An overall change towards diverse end-user devices, both corporate and privately owned, adds a new dimension of complexity, while compliance and security requirements challenge IT, CISOs and executive management. More

Webinar

Digital Transformation in Government

Digital transformation is increasingly affecting all types of organisations including Governments. In order to encourage citizens to adopt digital services, the least expensive channel for governments, it is necessary to support modern connection methodologies and provide user-focussed services. This webinar will investigate the challenges facing government and the opportunity digital transformation affords. More

Webinar

Making the Cloud a Secure and Easy to Use Environment

Most of today’s organizations store even their sensitive data in the cloud. Moving workloads to the cloud results in improved flexibility, elasticity, and reduced time to market for organizations. Nevertheless, companies have to realize these benefits painlessly, while keeping sensitive data secure. Applying an on-premises security model for infrastructure and apps in the cloud can achieve this. More

Past Webinars

Webinar

Privileged User Monitoring as Key Element of Counter-Measures

The IT landscape is undergoing its biggest change at least since the introduction of the PC. Cloud services and mobile devices stand for the hyper-connected enterprise, where everyone has access to everything, and where services reside somewhere, in the organization and in the cloud. This extends More

Webinar

Improving Your SOC Efficiency with Advanced Security Analytics

Today, the Security Operations Center (SOC) is at the heart of enterprise security management. Security analysts in most SOCs are still relying on traditional SIEM systems as a core platform for their daily operations. These are the primary tools to monitor and analyze security alerts coming from More

Webinar

Identity Assurance - the Art of Knowing Your Customers

To conduct online business, users need to be able to identify themselves remotely and reliably. In most cases, however, it is not sufficient for the user to simply assert "I am who I say I am - believe me." When doing digital business, you will never meet your customers face-to-face, and there is a More

Webinar

Cloud IAM – Get the Full Picture to Make a Real Win out of a Quick Win!

Cloud IAM, or IDaaS, is a rapidly growing market segment. This growth is driven by a variety of business cases, ranging from operational advantages and better support for employees accessing cloud services to the flexible integration of business partners and consumers in the age of digital More

Webinar

The Future of Privilege Management – Understanding the Bigger Picture

Privilege Management, the management of accounts with elevated privileges and, in particular, shared accounts, is changing drastically. Providing shared account password management, a privileged Single Sign-On, or restrictions for elevated privileges is no longer sufficient. More

Webinar

Prevent Data Breaches - Moving to a Modern Approach to Breach Avoidance in Three Steps

The history of IT Security is only a generation old, yet the direction of the arms race has already changed completely several times. Initially, perimeter-based security – firewalls and anti-virus software – played the most important role at organizations. By the beginning of the new millennium the More

Webinar

Sicherheit in den operativen Systemen der Industrie 4.0

Unter dem Begriff Operational Technology werden die Technologien zusammengefasst, die die Transformation von Waren und Dienstleistungen betreffen, etwa in produzierenden Unternehmen oder bei Energieversorgern (ICS: Industrial Control Systems & SCADA: Supervisory Control and Data Acquisition). More

Webinar

Enabling Cloud Access While Ensuring Security and Compliance

The cloud and mobile revolutions have changed the way we work and the very nature of IT. But these advances have also created immense new challenges and risks to security, data protection and compliance. More

Webinar

Beyond Usernames and Passwords: 3 Steps to Modern Authentication

There are three simple steps for moving to modern, more secure authentication. Make it convenient. Make it smart. Make it mobile. More

Webinar

Reinventing Smart Cards for the Modern Agile, Connected Enterprise

Smart cards have been a key part of any IT department’s security and identity management toolkit for over two decades. They are widely used for such operations like two-factor authentication, digital signatures, data encryption or single sign-on. Smart cards are an integral part of every More

Next Webinar

Webinar

GDPR as opportunity to build trusted relationships with consumers

Language:

English
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • Mar 16, 2017 4:00pm CET, 11:00am EDT, 8:00am PDT
Register Now

Popular Webcasts

Next Conference

Congress

Digital Finance World 2017

Digital Finance World (DFW) on March 01-02, 2017 in Frankfurt. Interact with a targeted and engaged audience, enjoy an unparalleled content depth, get guidance for critical decisions on the digital transformation of your enterprise.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00