Insights

Fraud Prevention

Account takeover (ATO) and account opening (AO) attacks harm consumers and enterprises. Fraudsters are constantly evolving their tactics, which leads to financial losses. Fraud reduction services help their customers to recognize malicious attempts to take over and/or create unauthorized accounts, thereby saving money and protecting reputations.

Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Tools Choice
Tools Choice
Security Orchestration, Automation and Response (SOAR)
This Tools Choice enables you to find the perfect SOAR vendor and solution for your IT infrastructure. Based on vendor-neutral research from our independent analysts, we have examined products and...
Learn more
Webinar
Webinar
Mehr Widerstandsfähigkeit gegen Cyberangriffe: Das Automatisierte SOC
Cybersicherheit ist zu einer zentralen Herausforderung für jedes Unternehmen geworden. Die Widerstandsfähigkeit, also die Cyber Resilience, ist inzwischen elementar für die Überlebensfähigkeit von...
Learn more
Blog
Blog
Software Supply Chain Risks: How to re-assess when there is a ban?
With supply chains under attack and the recent Kaspersky ban, CISOs need to act. But how?
Learn more
Advisory Note
Advisory Note
Architecting your Security Operations Centre
A security operations centre (SOC) is a dedicated team, usually operating 24x365, to detect and respond to cybersecurity incidents within your organisation that potentially affect your people and...
Learn more
Event Recording
Event Recording
Continuous Zero Trust Transformation using a Value and Risk Driven Approach
For big companies like Mercedes, there is no generic zero trust implementation to deliver the values for customer, workforce, suppliers and logistics.  It is unlikely to have a greenfield...
Learn more
Pools of Identity: Best Practices Start With Personal Password Behavior
Event Recording
Pools of Identity: Best Practices Start With Personal Password Behavior
New Security Fundamentals: Five Things CISOs and CTOs Should Consider
Event Recording
New Security Fundamentals: Five Things CISOs and CTOs Should Consider
The old saying goes, ‘The more things change, the more they stay the same”. This has never been more true than today in the modern CTO and CISO’s life. As technology evolves,...
Successfully tackling your Digital Supply Chain Risk
Event Recording
Successfully tackling your Digital Supply Chain Risk
In this talk, Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will provide insights on Digital Supply Chain Risk. He will look at the areas of risks, from secure partner onboarding...
Government's Role in Providing a Secure Framework for Digital Transformation
Event Recording
Government's Role in Providing a Secure Framework for Digital Transformation
This keynote will explore the role of government in providing a secure framework for digital transformation.
Panel | Leadership Outlook: What Are the Key Attributes of the Next-Gen CISO?
Event Recording
Panel | Leadership Outlook: What Are the Key Attributes of the Next-Gen CISO?
In this exclusively curated panel session, top CISOs from across the world reflect on where they find themselves today, explore trends that will define the cyber ecosystem over the next decade and...
Security in the Face of Change: Past Lessons & Prospects for Our Future
Event Recording
Security in the Face of Change: Past Lessons & Prospects for Our Future
The convergence of organizational decentralization, digitization, and global i nstability have raised the need to secure vital infrastructure. Can we learn from the past? Can we prioritize and...
Why Threat Intelligence is Losing its Edge and How to Overcome Noise Overload
Event Recording
Why Threat Intelligence is Losing its Edge and How to Overcome Noise Overload
Panel | Misinformation – Disinformation – Malinformation (MDM): The Next Big CISO Challenge?
Event Recording
Panel | Misinformation – Disinformation – Malinformation (MDM): The Next Big CISO Challenge?
Even though MDM has had a long history during war and times of high tension,  the digital era has been increasing reach and potential impact of weaponized misinformation. Sophisticated tools...
CISO Talk: Cloud as a Security Enabler
Event Recording
CISO Talk: Cloud as a Security Enabler
More organizations are now moving to the cloud.  From a security perspective – refactoring the applications provides a major opportunity to improve security posture.  This session...
Building Resilience After a Major Incident
Event Recording
Building Resilience After a Major Incident
This presentation will explore resilience measures to be taken immediately after a major incident.
Previous
4 5 6 7 8 9 10 Next