Videos

Latest videos

Watch the latest video blogs and webinar recordings. Stay up to date on new trends in the cybersecurity and identity industry to meet and exceed key business challenges.
Webinar Recording
Upgrade your IAM with IDaaS IGA
Dec 18, 2019
The Identity-as-a-Service (IDaaS) market continues to develop with a significant push from organizations looking to adopt cloud-based delivery of security services including IAM. While IDaaS Access Management solutions, providing SSO (Single Sign-On) for the users and access to a variety of services are already established, IDaaS IGA is not as widely used yet. However, shifting IGA (Identity Governance and Administration) capabilities, e.g. Identity Lifecycle Management and Access Governance, to the cloud might provide significant benefits regarding time and cost of deploying and operating IGA.
Event Recording
John Tolbert - The Information Protection Lifecycle
Dec 12, 2019

Too often those of us in the cybersecurity space get wrapped up in comparing, deploying, and managing point solutions. While this is a necessary consequence of both the fragmented nature of the market and the highly specialized nature of our work, sometimes we need to step back and look at the big picture. What kind of information am I charged with protecting? How can I discover and keep track of it all? What kinds of controls can I apply? How can data be protected in different environments, on different platforms, etc? We'll look at the various stages in the life and death of information and how to best manage and protect it.

Event Recording
Klara Jordan - The Forgotten Story of Cyber Hygiene
Dec 12, 2019
Event Recording
Dr. Komitas Stepanyan - Auditing Cybersecurity Governance: Putting the Elephant in the Fridge
Dec 12, 2019

The term Cyber sounds very attractive and everyone wants to use this term nowadays. Although many people talk about cybersecurity, however only some of them pay some attention to cybersecurity governance.
On the one hand, it is a challenge for top management to govern cybersecurity on the other hand it is challenge for internal audit to give an appropriate assurance on cybersecurity. Should Internal Audit give an assurance on cybersecurity – that is one of the most difficult questions? If yes – how? If not – who should? 
Cybersecurity is more about people, management and risk management and less about technologies. Although there are plenty of important, highly recommended technical fixes, new tools and techniques to adopt and implement, however if organizations’ management do not show appropriate leadership, if organizations do not have appropriate structure and processes for cybersecurity governance, than these organizations will be victims of hackers today or tomorrow.

Event Recording
Panel - New Cybersecurity Challenges: Cyber-conflitcs in Perspective
Dec 12, 2019
Event Recording
Per Thorsheim - Password Security in 2019 - More Important Than Ever Before!
Dec 12, 2019

There is no other computer related issue that affects more people globally and more frequently than passwords. We can easily authenticate

100 times day using pins, passwords, biometrics, cards and other technologies. At the same time we see time and again that weaknesses, vulnerabilities and flaws in these mechanisms are exploited to gain unlawful access to systems and data. New consensus on passwords & digital authentication exist, but a major challenge persist: how do convince everyone we've done passwords wrong for 30 years, and need to change everything? This talk will provide fascinating insights into the psychology & technology of passwords, with good advice, humor and the best news you have received in a very long time!

Event Recording
Tom Janetscheck - Threat Hunting with the Microsoft Cloud
Dec 12, 2019

With the preview-release of Azure Sentinel, Microsoft has shifted some features from Azure Security Center to its new threat hunting solution. But how do all the security tools Microsoft offers nowadays integrate with each other? How can you find a way through this security jungle? And how do you make sure to have the right tools in place when it comes to protecting your IT environments and hunting threats?
Join cloud security expert and Microsoft MVP Tom Janetscheck for this demo-rich session to get all these questions answered and to learn how to protect your resources easily and efficiently.

Event Recording
Jean-Christophe Gaillard - The Language of Security
Dec 12, 2019

How the way we talk about information security has changed over the last 2 decades, based on a quantitative analysis of 17 Global Information Security Surveys by EY (2002-2019)

Event Recording
Francisco Z. Gaspar - The Unpatchable Element
Dec 12, 2019
Webinar Recording
Identity Fabrics for True Digital Transformation
Dec 11, 2019
Business models are changing, customer relationships are changing, and business partnerships are far more volatile than ever before. Workloads are shifting to the cloud and to as-a-service models. Businesses are looking to provide more and more digital services to their customers and consumers via apps and integrate with devices and things. Digital Identity is at the center of these digital transformations.
Event Recording
Panel - The Future of AI in Cybersecurity
Dec 04, 2019

Numerous malware variants are being created daily. To adjust to this evolution, machine learning tools are being utilized by security companies to detect the novel threats and new attack vectors. Same for the threat hunting, where the ML helps in proactively and iteratively parsing through networks detecting the advance threats. Important question is where we want to apply these advanced techniques. The technology should be applied in a smart way to tackle specific problems. In this panel we will discuss the current state of AI in cybersecurity and what the future will hold.

Event Recording
Panel - Threat Hunting: Making Data Informed Decisions
Dec 04, 2019
Webinar Recording
Extending Beyond the Limits of Multi-Factor Authentication With Continuous Adaptive Trust
Dec 04, 2019
The Identity and Access Management (IAM) market is undergoing rapid and at times transformative change. A steady progression from on-premises to API and cloud platforms is visible as vendors innovate, but authentication tools are under attack from determined adversaries.
Event Recording
Ola Sergatchov - Beyond Cloud - the Place Where Security, DevOps and Business Meet
Dec 04, 2019

As a result of the continous evolution of IT platforms, new environments and applications show up to simplify our lives. Some receive them with suspicion, others embrace them. But security challenges don't change, they just multiply. Visibility and segmentation cannot be a roadblock on the never-ending quest for innovation and business agility.  

Ola Sergatchov, Vice President of Corporate Strategy at Guardicore, in her presentation, will explore how we can deliver more with less. How to accelerate while reducing security risks, and most importantly, align security, DevOps and business objectives without major IT overhaul.

Event Recording
Dr. Niklas Hellemann - Next Generation Phishing – Social Engineering in Times of Voice Phishing, AI and DeepFake
Dec 04, 2019

Phishing attacks on companies have become increasingly sophisticated in recent years. The high success rates in tactics such as CEO fraud, ransomware or cryptojacking have led to hackers spending much more time and resources manipulating their targets. This is also reflected in the increased incidence of spear phishing attacks and voice phishing operations. At the same time, technological developments in the field of machine learning (e.g. in natural language processing) offer a dangerous basis for new applications in this area. Dr. Niklas Hellemann gives an overview of new social engineering tactics, e.g. the a fraudulent AI-based voice bot that mimmicks the voice of top managers. In addition, hints are given on how companies can prepare themselves for advanced phishing methods, e.g. also using AI-based awareness solutions that simulate such attacks.

Event Recording
Dr. Heiko Klarl - Challenges of a Global IAM
Dec 04, 2019

Globalisation has spread business and production sites all over the world. Companies are faced with distributed IT systems as well as with different and demanding regulations in various countries, spanning from USA through to Europe and Asia, especially China and Russia. For many businesses IAM is a central part when it comes to managing employees, partners, customer, things and APIs in a secure and reliable way.

Event Recording
Dr. Mariarosaria Taddeo - The Risk of Trusting AI in Cybersecurity
Dec 04, 2019
Webinar Recording
On the Way to Becoming a Cognitive Enterprise
Dec 03, 2019
The digitalization has resulted in the "digital enterprise". It aims at leveraging previously unused data and the information hidden in it for the benefit of the enterprise. The “cognitive enterprise” comes with the promise to use this information to do something productive, profitable and highly innovative for the enterprise.  The cognitive enterprise is the application of cognitive technologies in critical areas of a company.
Cybersecurity Leadership Summit 2019
27 videos
Videos from the Cybersecurity Leadership Summit 2019 in Berlin, Germany
Event Recording
Martin Kuppinger - AI Already Revolutionizes the Way We Do Cybersecurity & IAM
Nov 28, 2019

There are many challenges business are facing when they are implementing IAM and Cybersecurity, be it role management and access controls or efficient analytics in the SOC that narrows down the incidents to put the focus of investigation on. As AI augments us increasingly in our daily live activities as well as workers on the factory floor, it also already is able to augment us in doing Identity Management and Cybersecurity better. Martin Kuppinger will look at the areas where AI already is used and where we expect AI to hep us revolutionizing the way we do Cybersecurity and IAM. He will provide perspective that rate the impact and maturity of technologies and deliver guidance on how to pick the best technology for your use cases.

Webinar Recording
Fighting Fraud With Strong Authentication
Nov 25, 2019
Strong authentication is one cornerstone of web security. However, account enrollment and account recovery processes are leaving gaps in the credential management lifecycle that allow bad actors to perform account takeover and get into our networks. Increasingly, these bad actors aren’t even real. Stolen identity information that is used to create new fake IDs, known as synthetic identity fraud, is a fast-growing form of fraud.
Webinar Recording
6 Myths of Privileged Access Management Busted
Nov 20, 2019
Industry thought leaders have stated that if there is only one project you can tackle to improve the security of your organization it should be Privileged Access Management (PAM). But successfully securing and managing privileged access is a tough task and is only getting harder to solve.
Webinar Recording
Legacy IAM System vs. Modern IAM Platforms - Should You Stay or Should You Go?
Nov 08, 2019
Application and infrastructure architectures are continuously changing in order to mirror the demands and challenges of organizational needs. A common problem with legacy systems is the inability to understand and adapt to the new business models in an ever-changing world.
Webinar Recording
KuppingerCole Identifies Leaders in Consumer Authentication
Nov 07, 2019
Password-based authentication is insecure, leads to a poor customer experience, and is costly for businesses to maintain. Knowledge-based authentication, often used for password resets, is even more insecure given that the answers to individuals’ security questions are often found online. Consumer-facing online businesses are looking for stronger authentication options to reduce the risk of fraud and provide more pleasant user experiences.
Webinar Recording
Getting a Grip on Your AI: Know What It Does. Understand the Risks and Rewards. Be Compliant
Nov 05, 2019
The case for integrating AI into business processes is ever stronger. Now it’s time to assess realistically what it can do for you. Existing successes and failures of AI beta-phase testing show how to resist the survivorship bias when implementing your own AI programs. Clarify the characteristics of AI data that may be problematic, and discover where investment should be concentrated on further customizing your AI solutions.
Webinar Recording
Complying With PSD2: Everything You Need to Know
Oct 30, 2019
With the Revised Payment Service Directive (PSD2) coming into full effect this fall, banks and online retailers need to adapt to changes that carry with them many regulatory and technical challenges. Acknowledging these extensive changes, Germany’s Federal Financial Supervisory Authority (BaFin) recently granted a period of grace for online retailers to implement the element of strong customer authentication (SCA), thus following the lead of other European financial regulatory authorities.
Webinar Recording
KuppingerCole’s Evaluation of Leading Vendors in the Identity API Platforms Market
Oct 24, 2019
Many different factors are driving Digital Transformation in the market today. One factor is the change in how businesses interact with their customers. Another factor is more on the technical side that addresses the implementation of new Digital Services that have become more complex due to the different environments and the many integration points to consider.
Webinar Recording
Facilitating Business with State-of-the-Art Identity Proofing Solutions
Oct 18, 2019
For traditional or Business-to-Employee (B2E) IAM, HR departments are responsible for gathering documentation from employees to determine their suitability for employment. For Business-to-Consumer (B2C) or CIAM, identity proofing can be more difficult. Depending on the nature of the business, the attributes that need to be collected and verified can differ widely. For example, Know Your Customer (KYC) and Anti-Money Laundering (AML) regulations govern the kinds of attributes and authoritative attributes that must be collected in the finance industry.
Webinar Recording
Onboarding Your Business Partners to Your Services: B2B IAM in Practice
Oct 11, 2019
Virtually any business needs to grant business partners access to certain IT services. While employee IAM is a well-established discipline, where HR frequently delivers the information about joiners, movers, and leavers, and while Consumer IAM (CIAM) commonly relies on self-registration, B2B IAM comes with different challenges.
Webinar Recording
How Leading Brands Build Trust With CIAM
Oct 02, 2019
In the age of digital transformation, consumers tend to have multiple digital identities across several devices deploying a variety of services. In this environment, digital trust is what sets brands apart from their competitors. Taking and storing customer data is a duty of care, and brands cannot afford data breaches or compromises.
Webinar Recording
Cybersecurity Budgeting 2020: Set Your Priorities Right
Sep 26, 2019
For the majority of businesses, the budgeting season is about to start. Some are done, some will be later, if the fiscal year differs from the calendar year. But usually, in September and October, this process is kicked off.
Webinar Recording
The Compelling Case for Risk-Based Adaptive Authentication
Sep 25, 2019
Consumers and employees are increasingly on-the-go, and that means that more transactions and more work originates from the mobile phone. Fraud and data loss rates have also been rising. A plethora of mobile-based digital identity technologies have entered the market over the last few years to help businesses and other organization meet these challenges.
Event Recording
Martin Kuppinger - New Technologies, New Challenges, New Opportunities: Finding The Right Balance
Sep 19, 2019

How and where AI, ML, Blockchain, CIAM, Libra, and others can help solving the challenges of Digitization, a changing competitive landscape, and new regulations such as PSD2 in the Finance Industry – and where not

Both traditional Finance Industry and emerging FinTech are under pressure. The competitive landscape continues to change, with new players entering the market, new business models emerging, and new regulations requiring changes in the way business is done. Everyone is fighting for the customer and wants to be the “face to the customer” – the one who controls the business relationship and interaction.

On the other hand, there are many new technologies such as payment systems, Blockchain ID, the potential AI & ML promise, and many more.

In his talk, Martin Kuppinger will look at the big picture of the Finance Industry and its change in the Digital Era, with specific focus on how the various players in this market can benefit from focused use of emerging technologies to strengthen their competitiveness.

Webinar Recording
The Globalization of IAM for Manufacturing Businesses
Sep 18, 2019
Globalization has given many companies the opportunity to run factories and other operations in various countries. In doing so, manufacturers are faced with challenging regulations they have to comply with and that may differ in the U.S., EMEA, Russia, China, and other countries. IAM is an essential element for operating business, when it comes to employees, business partners such as suppliers, and customers.
Webinar Recording
How to Stop Attacker Movement in Your Network Before They Reach your “Crown Jewels”
Sep 12, 2019
Nearly all high-impact cyberattacks have a phase in which the attacker must conduct lateral movement from their initial landing point to their ultimate target. To do this, the attacker needs a combination of credentials and available connections between one system and another. This is the evasive process of “living off the land” using the connectivity native to the organization.
Webinar Recording
Regaining Control With IGA Solutions
Sep 11, 2019
Role management remains a pivotal challenge in many companies. Regulations (such as BAIT and VAIT in Germany) require companies not only to implement an IGA solution (Identity Governance & Administration), but also a uniform authorization concept and its regular review, including the assignment of access rights to the individual authorized persons.
Webinar Recording
It’s Time to Forget Your Password and Settle for Multi-Factor Authentication
Sep 06, 2019
The majority of security breaches and attacks can be traced back to stolen and compromised passwords. Mobile devices are often particularly vulnerable because many users tend to avoid long passwords and special characters.
Webinar Recording
KuppingerCole’s Evaluation of Leading Vendors in the IDaaS Access Management Market
Sep 04, 2019
Identity-as-a-Service Access Management (IDaaS AM) has emerged as one of the fastest-growing markets of IAM, characterized by cloud-based delivery of traditional IAM services. KuppingerCole estimates the global IDaaS market will continue to grow at a CAGR of 24% in 2019.
Webinar Recording
Privileged Access Management Needs a New Approach
Jul 17, 2019
As organizations accelerate their digitalization efforts to stay relevant and competitive in the marketplace, they must evaluate and embrace technologies that can not only support the enablement of their digitalization efforts but can also support the speed, scale and security required for such digitalization efforts.
Digital Finance World 2019
2 videos
Videos from the Digital Finance World 2019
Event Recording
Digital Finance World 2019
Jul 15, 2019
Webinar Recording
The Passwordless Enterprise: Building A Long-Term Zero Trust Strategy
Jul 12, 2019
“The password is dead.” We have heard this statement for at least a decade, yet even in 2019, data breaches based on stolen user credentials continue to dominate the headlines. Why do passwords so stubbornly refuse to die?
Webinar Recording
Security in the Age of the Hybrid Multi Cloud Environment
Jul 05, 2019
The way is clear for the hybrid multi-cloud environment! With an increase in cloud services, the mitigation of cyber risks within such environments becomes paramount. The value of traditional security tools for cloud applications is very limited and the misconfiguration of cloud platforms is a key threat to their security.
Webinar Recording
Challenges for Managed Service Providers Offering Privileged Account Management as a Service
Jul 03, 2019
Insufficiently protected privileged accounts pose high risks to any given company today. Therefore, Privileged Account Management (PAM) is of paramount importance to a functional insider threat program, which is at the core of any modern cybersecurity strategy. While utilizing a variety of IaaS, PaaS and SaaS offerings, organizations often face difficulties in controlling the management of their privileged accounts due to a lack of time, budget and other resources.
Webinar Recording
Under Pressure From the Auditor: Rapid Response by Rapid Access Reviews
Jun 28, 2019
Most organizations are aching under the pressure the feel from auditors in delivering information. A large portion of that is based on access reviews, i.e. demonstrating that the least privilege principle and related regulatory requirements are met.
Webinar Recording
Mit Access-Governance-Projekten neue Vorschriften erfüllen, ohne das Rad neu zu erfinden
Jun 27, 2019
IGA-Projekte (Identity Governance & Administration) bergen aufgrund ihrer Komplexität diverse Risiken. Diese ergeben sich meistens in der Vernetzung einer komplexen, heterogenen IT-Infrastruktur sowie durch den bereichsübergreifenden Charakter von IGA-Projekten. Wenn man nicht bei jedem Projekt immer wieder von Null anfangen möchte, und auf Erfahrungswerte zurückgreift, können viele Risiken sehr leicht vermieden werden.
Webinar Recording
The Dark Side of the API Economy
Jun 25, 2019
In a single decade, Application Programming Interfaces (APIs) have evolved from a purely technical concept into one of the foundations of modern digital business, delivering operational efficiency, scalability and profitability to companies from various industries. Nowadays, everything is API-enabled: corporate data is the product and APIs are the logistics of delivering it to customers and partners.
Webinar Recording
Getting Rid of the Password – How to Increase Safety Affordably
Jun 19, 2019
Despite compromised passwords being the leading cause of data breaches, most online businesses still rely on solely using passwords for logins. While getting rid of password authentication is desirable from a security standpoint, organizations fear that it is a costly endeavor that can also affect user experience.
Event Recording
Image Video EIC 2019
Jun 17, 2019
Webinar Recording
Fine-Tuning ICS Threat Models to Prioritize Mitigations of the Most Vulnerable Devices
Jun 14, 2019
When discussing the matters of industrial cybersecurity with IT experts, lamenting the historical divide between OT and IT seems to be a popular topic: you would often hear that the OT engineers are stubbornly ignoring the latest cyberthreats and do not see security as a priority in general.
Webinar Recording
Leverage Enterprise Architecture to Achieve GDPR Compliance
Jun 06, 2019
Several measures have been undertaken by Organizations at various levels to comply with GDPR, most of which remain reactive, fragmented and largely ad-hoc. These controls are also not continuous in nature and therefore fail to satisfy ongoing compliance requirements. Organizational leaders (CISOs, CIOs, CDPOs or CROs) felt the need for better data controls that should be baked into organizational processes to ensure compliance by design.
Webinar Recording
The Compelling Need for Privileged IT Process Automation
May 31, 2019
IT processes can often be repetitive and many of these tasks can take companies a lot of time and costs, putting pressure on highly skilled IT staff. By automating IT processes, companies can not only become more productive and efficient but also relieve the load on their IT department.
Webinar Recording
All the Roads Lead to the C, Paved with B2B
May 29, 2019
More and more organizations use CIAM for B2B use cases as such combination can help companies position themselves on the market. While no one argues that user experience journey for the B2B Customer is just as important as any other customer, they most certainly need a relatively different set of features.
Webinar Recording
Is Multilayered Cyber-Defense Out Already? Against Rising Breaches and Vulnerabilities, Data-Centric Security to the Rescue!
May 24, 2019
As the growing number of high-profile data breaches indicates, even the largest companies are still struggling with implementing consistent enterprise-wide information security measures. Setting up various security tools for numerous different applications, services, and heterogeneous systems and then making them work together efficiently is a massive challenge.
Webinar Recording
The No. 1 Rule of Secure Cloud Migration: Know Your Unstructured and Dark Data and Where It Is Located
May 22, 2019
With a huge amount of data around, cloud migration is the ideal solution today. A necessary stage in migrating data to the cloud is putting it in order. This is particularly important when it comes to unstructured, so-called dark data: files and documents that are undermanaged (excel files of budget estimates, PDFs containing important patents, Word documents containing personal employee or customer information), in general the data that is not managed in an orderly fashion such as structured database which is easily governed. Usually, this kind of data that tends to be misplaced, misused, abandoned, hacked, or leaked, in the cloud and local server repositories putting enterprises at risk.
Event Recording
European Identity & Cloud Conference 2019 Wrap-Up
May 17, 2019
Event Recording
Impressions of the European Identity & Cloud Conference 2019
May 17, 2019
Event Recording
Impressions of the AI Innovation Night at EIC 2019
May 17, 2019
Event Recording
Martin Kuppinger - Closing Keynote & Announcement of EIC 2019s Gamification Winners
May 17, 2019
Event Recording
European Identity & Cloud Awards Ceremony
May 17, 2019

The KuppingerCole Jury will once again honor outstanding Identity Management and Security Projects and Initiatives.

Event Recording
Mark Stephen Meadows - That Robot Overlord Is in Your Kitchen. Her Name's Alexa
May 16, 2019

If we look under Alexa’s hood and read between the technologies we find a disturbing reflection of our own identities and personal data. In your home Alexa is always listening and influencing your options. In your company’s product deployment Alexa is influencing your brand, your customers, and your user data.  We will discuss why this represents a geo-political shift more significant than the rise of social media. As a previous developer of Alexa skills and other AI systems I will share with you my lessons learned.

And we will examine alternatives.

Event Recording
Maximilian Möhring - The Future of Digital Identity is Decentral, But Not Blockchain
May 16, 2019

This interdisciplinary talk will lead you through on why not just identities, but any identity-related information should not be stored on a blockchain. The main technical reason being that none of the blockchain USPs is applicable when it comes to identity (-related) data, especially assertions.The legal and business reason being that blockchain is not (yet) compatible with and accepted in our legal and regulatory framework. So what is the way to go?

There's not many other areas where security and decentralisationis as important as when we're dealing with identity data. Max will explain how to take advantage of already-existing technology (even edge technology) to ensure convenience for the enterprises as well as cost reduction while at the same time making sure there is maximum convenience for the identity owners (humans, machines and other enterprises).

Event Recording
Henk Marsman - Blockchain & IAM: A Perfect Fit or a Squared Peg and a Round Hole?
May 16, 2019

Blockchain to some is the future solution for everything, or at least for managing identity information. Rabobank is piloting extensively with blockchain. In his presentation Henk will use a few cases on blockchain to see what works well and what doesn't, and where blockchain could be applied to managing identities, whether these are customer identities or employee identities. Or both.

Event Recording
Dr. Karsten Kinast - The Global Race for AI – Is it Time to Regulate Now?
May 16, 2019

Not only is there no form of AI that understands what it says, can draw conclusions from it, and can base decisions on it, but it is not even known how such a synthetic intelligence could be created. In our time, let's say in the next two and a half decades, it is not primarily a question of developing an ethical code within which AI's can unfold as independent subjects, but rather of a far more profane view of responsibilities. If a self-propelled car decides to drive against a traffic light pole without any action on my part, who is responsible for the damage?

Are there already solutions in our current legal system for the regulation of such matters, in which only the former of the "basic manifestos" of injustice - the constituent elements of the offense, illegality, and guilt - still plays a role, or must a new category be devised for this?

This keynote will offer an interesting reflection on the current and future situation.

Event Recording
Kim Cameron - Turning the Web Right Side Up – Giving People What Is Theirs
May 15, 2019

A steady stream of trends has built up over the years fueling a growing momentum around Decentralized Identity.  Kim Cameron will report on why early adopters – enterprises both large and small – are already beginning to make Decentralized Identity part of their strategy for digital transformation.  He will argue that the underlying trends will only intensify – and that enterprises which figure out how to benefit early will benefit the most.

Event Recording
Patrick Parker - Applying Microservice Design Principles to Cloud Security Management
May 15, 2019

The old paradigm of a centralized directory for security has been shattered into a thousand pieces and scattered across the Cloud. Identities, sensitive data and resources, and the management of who may access them are now distributed across hundreds of on-premise and Cloud systems each with its own idiosyncratic security model and none designed to be managed in unison. The shift to Microservices has accelerated the pace of this change. Given this monumental new challenge what is the solution for identity professionals?

The answer lies in embracing this change and applying Microservice design patterns to Identity and Access Management. As an example, IAM can play a key role in an organizations Microservices design by acting as what is known as an "Anti-Corruption Layer". The Anti-Corruption Layer Design pattern isolates systems having different models by translating communications between them, allowing one system to remain unchanged while the other can avoid compromising its design and technological approach. In this case, IAM can be the glue that translates between an organizations security practices and the multitude of ever-changing Cloud applications and their local security.

Event Recording
Panel: Tower Defense, Identity Edition: Zero Trust, Machine Learning, MFA & Passwordless - How to Prevent your Customers & Employees from Falling Victim to Hackers
May 15, 2019

The attackers are coming in ever increasing waves - come and learn how to set up your defenses so you have the lowest likelihood of account compromise, and accounts which do fall present minimal risk. 100's of thousands of accounts fall victim to hackers every day across consumer and enterprise Identity systems. Attacks are increasing in volume, and Identity takeover remains the "brass ring" for attackers.

The good news? More than 99.9% of these compromises are easily preventable by using the principles of Zero Trust and modern Cybersecurity tools. Benefit from the analysis of more than 18B logins and 300M deflected attacks each day, tenant configuration, and attacker pattern to get clear ideas of the most effective patterns for protecting identity systems (and plenty of motivation to apply them!)

European Identity & Cloud Conference 2019
31 videos
Keynotes, interviews, and selected sessions from the European Identity & Cloud Conference 2019.
Event Recording
Jochen Werne - HUMAN. DIGITAL. CULTURE - Disruption or just Progress? Impacts of Artificial Intelligence on Business and Society
May 14, 2019
Event Recording
Martin Kuppinger - Opening Keynote
May 14, 2019
Webinar Recording
Next-Gen Identity Analytics and Access Governance Approach
May 10, 2019
Identity Governance and Administration (IGA) is undoubtedly one of the most valued but complex and lengthy technology implementations. While IAM leaders are still trying to figure out the complexities of IGA, the massive cloud uptake with the advent of machine learning accelerates identity analytics and access governance for creation of Next-Gen IGA solutions. Machine Learning inspired IGA offers significant improvements to enhance identity analytics and access governance processes to enable IAM leaders support the business better by helping them make more informed decisions.
Webinar Recording
Identity Governance - the Value of Leveraging IGA Functions from the Cloud
May 08, 2019
Even though companies need to implement Identity Governance & Administration (IGA) solutions in order to stay compliant and support their security, the deployment of IGA solutions still poses a challenge to many of them. Delivering a frictionless experience for users and employees while efficiently managing identities and access entitlements are key to a successful deployment.
Webinar Recording
Artificial Intelligence: Disruption Ahead?
May 03, 2019
When AI comes to mind, many people, maybe in Europe a bit more than in other parts of the world, fear some kind of terrestrial robot overlords taking over control, forcing us humans to surrender and devote our freedom to their understanding of a well-organized society without all those things that make our lives worth living.
Webinar Recording
Adding Depth to Your IAM: Automating Microsoft Active Directory and Azure AD Administration
May 02, 2019
IAM and therein IGA (Identity Governance & Administration) focuses on managing identities and their access across a variety of systems.
Webinar Recording
Secure Login for Highly-Regulated Hybrid Environments: Avoid Being Forced Into the Cloud
Apr 26, 2019
The march of the cloud is unstoppable. Eager to outsource the tedious and expensive maintenance of their IT infrastructures to a reliable 3rd party, most companies would dream of becoming cloud-native, at least in the long term. Needless to say, letting someone else run your identity management out there sounds like a great idea as well, hence the rising popularity of Identity-as-a-Service solutions that combine the latest technology achievements with the flexibility of the cloud.
Webinar Recording
The Fast Track to Regulatory Compliance: Lean, Efficient, and User-Centric Access Governance
Apr 10, 2019
Various regulations mandate businesses not only to implement an IGA (Identity Governance & Administration) solution, but as part of that to regularly review their access entitlements across the entire IT landscape, starting with an initial clean-up. This can result in complex projects with multi-year initiatives on defining business roles and cumbersome access review (recertification) processes, which annoy the business users. Factually, such approaches even might fail in fulfilling the regulatory requirements, just because they never get done and used.
Webinar Recording
The Foundation for GDPR Compliance and PI/PII Protection: Understand Where Data Resides and Who Processes It
Apr 03, 2019
The EU GDPR requires covered organizations to be able to account for and document how personal data is collected, processed and shared. What many companies often fail to realize is that this data is not only stored in specialized and appropriately secured silos such as databases. In fact, the vast majority of their business information is in unstructured and semi-structured formats, distributed across multiple systems an services. Without consistent visibility into whose data is processed across these environments, organizations cannot adequately account for how personal data is processed - as well as lose the context they need to identify security and compliance issues such as excessive privileges. To both address the compliance need for accountability and the security need for visibility, a new approach to data understanding is needed.
Webinar Recording
Privileged Access Management - the Focal Point for Your IAM Today
Mar 28, 2019
PAM (Privileged Access Management) has grown over these years to become a crucial set of technologies that addresses some urgent cybersecurity issues today. 
Webinar Recording
Mitigate Identity-Related Breaches in the Era of Digital Transformation
Mar 22, 2019
Cyber attackers continue to be successful in gaining access to many different organizations, often by exploiting identities and weak authentication. To ensure they are protected, organizations should consider modern Adaptive Authentication techniques to increase identity security and thwart attacks.
Webinar Recording
API Security: Separating Truth from Fiction
Mar 15, 2019
APIs (application programming interfaces) have undergone a truly amazing transformation in recent years. From an obscure technical term only software developers were familiar with, they have developed into one of the foundations of today’s digital business. Nowadays, APIs are everywhere – they enable business communications with partners and customers, make applications from different vendors work together seamlessly, power large IoT networks and the whole cloud. For many companies, APIs have even become the very foundation of their business models and the primary source of income.
Video
Matthias Reinwarth - The wrong click: it can happen to anyone of us
Mar 07, 2019

The wrong click: it can happen to anyone of us

Event Recording
Consumer Identity World 2019
Feb 28, 2019
Webinar Recording
CCPA vs. GDPR: An Overview on Similarities and Differences
Feb 14, 2019
Over the last few years, the world has witnessed an increasing number of data breaches involving the credentials and PII of employees, citizens, and consumers. We've all experienced breach fatigue and/or been impacted by these losses.
Webinar Recording
IDaaS: Your Identity Fabric. Connecting Every User to Every Service, Seamlessly
Jan 30, 2019
Making your service available to everyone, everywhere, without losing control. On their digital journey, businesses are constantly launching new digital services, chased by competitive and innovative pressure.
Webinar Recording
Solving New Authentication Challenges While Finding Parity Between User Experience and Security
Jan 16, 2019
In an increasingly hostile world, where you don't know who to trust, companies still need to be able to deliver trusted, personalized experiences for users, without making them jump through hoops to prove who they are.
Video
Martin Kuppinger - AI in a Nutshell
Jan 08, 2019

What AI is and what not

Video
Martin Kuppinger's Top 5 CISO Topics for 2019
Jan 02, 2019

Where to put your focus on in 2019