Insights

Artificial Intelligence

Recent improvements in computing capabilities mean that machines or systems are now able to complete tasks they have been trained to do in a semi-autonomous way. AI can handle huge volumes of data to produce insights, recommendations, and forecasts; it can save time through automation to complete tasks quickly and accurately; it has the potential to create new revenue streams; and it can be applied in a variety of ways across a range of industries. 

Guide
Guide
Securing Artificial Intelligence – The Impact of AI on Businesses
Learn all about Artificial Intelligence in cybersecurity. Understand the basics and the potential impact on your business.
Learn more
Webinar
Webinar
Urgent: Find and Block Identity-Centric Security Threats Today
The inability to deal with identity-centric cyber threats is one of the most critical issues facing modern enterprises. Attackers are increasingly targeting digital identities to gain unauthorized...
Learn more
Blog
Blog
PAM in a Post-Pandemic Digital World
Business IT and the way people work is changing. Trends towards digital transformation and remote working have only been accelerated by the global Covid pandemic. Therefore, the ways organizations...
Learn more
Leadership Compass
Leadership Compass
Data Quality and Integration Solutions
This report provides an overview of the market for Data Quality and Data Integration solutions that help in gathering, integrating, cleansing, improving, and enriching data across the complete...
Learn more
Event Recording
Event Recording
The Changing Cyber Threat Landscape and its impact on IAM (I)
Learn more
Data Quality and Integration Solutions
Leadership Compass
Data Quality and Integration Solutions
This report provides an overview of the market for Data Quality and Data Integration solutions that help in gathering, integrating, cleansing, improving, and enriching data across the complete...
Analyst Chat #149: The Top 5 Cybersecurity Trends - Looking Back at CSLS 2022
Analyst Chat
Analyst Chat #149: The Top 5 Cybersecurity Trends - Looking Back at CSLS 2022
Deep Fakes, AI as friend and foe, Business Resilience, Mis-, Dis- and Malinformation: The Cybersecurity Leadership Summit has taken place in Berlin and covered all of this and much more. Martin...
Panel | Best Practices for Implementing Enterprise Security Automation for Threat Detection and Intelligence
Event Recording
Panel | Best Practices for Implementing Enterprise Security Automation for Threat Detection and Intelligence
As the intensity and sophistication of cyber-attacks continues to increase amidst an uncertain threat landscape, enterprises are actively looking to embrace security automation as a potential...
CSLS Wrap Up and Closing Keynote
Event Recording
CSLS Wrap Up and Closing Keynote
Security Automation Strategies to Succeed or Fail: You Choose
Event Recording
Security Automation Strategies to Succeed or Fail: You Choose
This presentation will explore why companies need security automation. We will look at how companies can ensure success (and how to ensure failure). Leveraging professional experience and doctoral...
A Picture is Worth a Thousand Lies: Deepfakes or AI-Generated Synthetic Media
Event Recording
A Picture is Worth a Thousand Lies: Deepfakes or AI-Generated Synthetic Media
Imagine deepfake footage of a CEO engaging in bribery, a politician committing a sexual assault just a few days before an election, or soldiers committing atrocities on foreign soil. In our...
Panel | Looking into the International and German Governmental Cybersecurity Architecture
Event Recording
Panel | Looking into the International and German Governmental Cybersecurity Architecture
From Christina Rupp’s initial talk, we have seen that Germany’s governmental cybersecurity architecture is a complex ecosystem. In this Panel Session, we will discuss challenges and...
Software Bill of Material - a Way to Prevent Black Swan Events?
Event Recording
Software Bill of Material - a Way to Prevent Black Swan Events?
SBOM offers multiple ways of getting under the covers of your and other provider's software resilience. Implemented properly, SBOM not only increases code and library transparency with a a much...
Workshop | Break the Kill Chain – An Intelligence-Led Model to Cyber Defence
Event Recording
Workshop | Break the Kill Chain – An Intelligence-Led Model to Cyber Defence
Workshop | Strategy, Risk, and Security: Building Business Resilience for Your Organization
Event Recording
Workshop | Strategy, Risk, and Security: Building Business Resilience for Your Organization
Every business should be equipped to understand for itself what most threatens and endangers its business model. This is the starting point for preparation measures for disruptions and crises...
1 2 3 4 5 6 7 Next