Upcoming Webinars

Webinar

Knowing Your Customer Well: The Importance of Assurance and Identity Governance for CIAM

Consumer Identity and Access Management is a fast-growing market. Emerging just a few years ago, it has quickly evolved to become an indispensable tool for many organizations to improve the reach and targeting of their marketing activities, increase the number of new customer registrations and to provide frictionless user experience. CIAM solutions allow businesses and public-sector agencies to gather more information about the consumers while maintaining compliance with the current and upcoming data protection regulations like the EU GDPR and PSD2. More

Webinar

GDPR: The Six Critical Steps to Compliance and Brand Differentiation

From May 2018 when the upcoming EU GDPR (General Data Protection Regulation) comes into force, the requirements for managing personal data will change. Companies collecting such information from their customers will have to adapt to fundamental changes both in the very definition of personal data and in technical requirements around its secure and privacy-enhanced processing, including topics like consent management, data portability and the right to be forgotten. You will also understand why leading companies, however, will look beyond compliance to how they can enhance their customers’ More

Webinar

Security Management im digitalen Unternehmen: Business-orientiert, agil, effektiv

Wie schön waren die Zeiten, in denen man die physische wie digitale Sicherheit in seinem Unternehmen als eine Art Ritterburg mit umlaufendem Wassergraben („Perimeter“) abbilden konnte. Nur wenige, gut bewehrte und streng bewachte Zugänge („Firewalls“) sorgten dafür, dass der Austausch zwischen drinnen und draussen kontrolliert erfolgte und Raubritter wenig Möglichkeiten hatten, sich unberechtigt Zugang zu verschaffen. More

Webinar

Compliance als Vorteil: Technische Anforderungen der GDPR für moderne digitale Unternehmen

Ohne Zweifel ist der 25. Mai 2018 im Kalender jedes IT-Spezialisten rot angestrichen. Denn an diesem Tag tritt die neue Datenschutz-Grundverordnung (General Data Protection Regulation, GDPR) in Kraft, welche die Art und Weise, in der personenbezogene Daten von in der EU ansässigen Unternehmen oder anderen Unternehmen, die in der Europäischen Union geschäftlich tätig sein möchten, behandelt werden, grundsätzlich verändert. Nachhaltig beeindruckt von den strengen Strafen, die im Rahmen der neuen Verordnung vorgesehen sind, sind Unternehmen eilig bemüht, sich auf die neuen rechtlichen, More

Webinar

Improving Agility and Reducing Cyber Risks with Business-Driven Security Policy Management and Automation

Today’s enterprises are under continuous pressure to support new digital transformation initiatives, to adopt modern technologies like the cloud and software-defined data centers (SDDC) and, of course, to stay protected from external and internal cyberthreats. With the increasing pace of business, achieving greater agility and efficiency through automation of business processes is becoming one of the key challenges for IT. Unfortunately, the resulting dramatic increase in complexity of heterogeneous IT infrastructures combined with growing sophistication of modern cyberthreats has made More

Webinar

Industrial Control Systems: Understanding the Access Risks and Security Challenges

For decades, Industrial Control Systems have evolved completely separately from traditional IT, with their own business drivers, requirements and regulations and proprietary hardware designs and network protocols. Needless to say, security from cyberattacks was never a priority for operational technology units responsible for managing those systems: after all, they weren’t even connected to office networks. More

Webinar

Connected Car: Putting Digital Identity Behind the Wheel

The Internet of Things comprises of a diverse range of devices – from industrial sensors controlling critical manufacturing processes all the way to home devices like smart TVs and fridges. The idea of connecting a car to the internet started as an upgrade to the vehicle’s onboard entertainment system. The concept quickly evolved and branched into numerous market segments including navigation systems, safety and diagnostics, toll payments, and fleet management. More

Webinar

Revised Payment Service Directive: Understanding Its Technical Requirements for a Smooth and Secure Customer Experience

In less than 24 months, banks will have to comply with the Revised Payment Service Directive, commonly called "PSD2". The directive will introduce massive changes to the payments industry, removing the banks’ monopoly on their customer’s data. It will radically alter the user experience for customers of European banks by allowing third party payment service providers (TPP) to access their account information to provide various innovative financial services. But to achieve this, banks and TPPs must put the technical requirements in place in a secure way. More

Webinar

Identity and Access Management for Microsoft Azure and SharePoint Online

As Microsoft’s cloud solutions – including Microsoft Azure, Microsoft Office 365, and Microsoft SharePoint Online – are gaining more market share, integrating these platforms into existing enterprise IAM environments becomes essential. As more and more sensitive corporate data is moved to the cloud, ensuring strong information protection, secure access for employees, partners or customers, and, last but not least, compliance with the stringent regulations like GDPR, is impossible without a unified IAM across all on-premises and cloud systems. More

Webinar

Redefining Access Governance for Security and Fraud Prevention in Critical Applications

Continued digitalization of modern organizations, supported by the growing adoption of cloud computing, big data and other innovative information technologies, shows no signs of slowing down. Critical business data such as corporate intellectual property, financial documents or sensitive personal information, which traditionally have been kept in the most secure on-premises systems, must now be made accessible to the outside world: remote offices, mobile workforce, business partners, sometimes even the whole Internet. More

Webinar

Step-by-Step Guide to GDPR Compliance

With less than 250 days left till the dreaded EU General Data Protection Regulation (GDPR) comes into force, organizations around the world are feeling increasingly uneasy. Any company, both large and small, that wants to continue doing business in the European Union must comply with GDPR or face harsh penalties. More

Next Webinar

Webinar

Knowing Your Customer Well: The Importance of Assurance and Identity Governance for CIAM

Language:

English
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • Oct 17, 2017 4:00pm CEST, 10:00am ET, 7:00am PT
Register Now

Popular Webcasts

Next Conference

Conference

Consumer Identity World Europe 2017

Managing customer information in a digitally transformed economy with numerous business partners demanding access is one of the most significant challenges today, and it will continue to evolve rapidly. Besides that, the challenge is to offer user-friendly login procedures via social media accounts, passwords or biometric devices while securing and respecting personal data at the same time CIW Europe is a joint Event with our Partner CXP (Le Groupe CXP, Paris, France).

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00