Cybersecurity Practice Director & Chief Information Security Officer
Christopher Schütze
With almost 15 years of experience in IAM and Cybersecurity, Christopher is experienced in advising clients on a strategic level with necessary technological background. He holds a Master's degree in Computer Science from the Karlsruhe Institute of Technology and combines both theoretical background and technical expertise. Christopher is an experienced speaker and moderator at KuppingerCole and other events.
Roles & Responsibilities at KuppingerCole
Christopher is the Chief Information Security Officer and Director Practice Cybersecurity at KuppingerCole. He is responsible for internal information security. In his role as Director Practice Cybersecurity he aims to expand KuppingerCole's expertise in cybersecurity and to further develop exciting topics for advisory, research, and events.
Background & Education
He graduated at the Karlsruhe Institute of Technology and holds a master's degree in computer science with a focus on software engineering and telematics. He also has many years of experience in infrastructure and cloud technologies and is certified in PRINCE2 Agile.
Areas of coverage
- Authentication and Authorization
- Cybersecurity
- Privileged Access Management
- Cloud Technology
- IAM/IAG Guidelines, Processes, Organization
Professional experience
Christopher was Head of Cloud Security at an auditing company and working at two integrators for identity and access management. He has provided clients with technical and strategic support in a wide variety of projects. He specializes in security topics in networked environments with in-depth technological and process-related considerations.
Latest research
Executive View
Ping Identity’s PingFederate
November 26, 2020
PingFederate is among the leading-edge solutions that support identity federation standards. PingFederate can enable Single Sign-On (SSO) between business units, enterprises, and all popular SaaS applications. PingFederate works both on-premises or in the cloud and is easy for…
Executive View
CyberArk
August 28, 2020
Privileged Access Management (PAM) has evolved into a set of technologies that address some of today's most critical areas of cybersecurity in the context of digital transformation and industrial change. The CyberArk Core Privileged Access Security solution is designed to secure and protect…
Leadership Brief
Incident Response Management
August 04, 2020
The probability of becoming a victim of a data breach is now higher than ever. The hyperconnected world and the ever-increasing complexity of modern IT systems and processes pose new challenges for IT staff. All organizations must invest in an Incident Response Management plan. Preparation…
Leadership Brief
Security Fabric: A Methodology for Architecting a Secure Future
July 09, 2020
Work from home, bring your own device, a professional cyber-crime industry, IoT & OT. We all have to face these challenges while fullfilling a zoo of endless requirements. It is complex to keep the overview and the flexibility in our IT security services and the used toolset. Setting up the…
Executive View
One Identity Manager
May 14, 2020
One Identity Manager is one of the leading Identity and Access Governance (IAG) solutions. It builds on a sophisticated, consistent concept which allows for intuitive user experience, rapid customization and easy deployment. One Identity Manager is offering a rich toolset and framework to…
Leadership Brief
Cybersecurity Trends & Challenges 2020
February 26, 2020
2019 already has been a challenging year in cybersecurity. There have (again) been many severe cyberattacks and breaches, and there is no hope that this might change in 2020. Cyberattacks will continue to increase in frequency and perhaps severity, and the cyber risks to hyperconnected…
Latest blog posts
Blog
Speaking in Cybersecurity: My Recollection!
July 25, 2022
During my studies and the subsequent first years of my career, I was already always someone who liked to share knowledge with others and present interesting topics. This is not the only reason why my profession has developed in the direction of IT consulting. In fact, in consulting, "being…
Blog
The Evolution of Endpoint Security: Beyond Anti-Malware
October 29, 2020
15 to 20 years ago, a virus scanner – or let me call it Endpoint Protection – on your private or corporate computer was standard. Today, you must also have something like a virus scanner on your endpoint device. But in 2020, is it sufficient to detect viruses, worms,…
Blog
Security Fabric: Investing in the Right Architecture for a Secure Future
June 25, 2020
Modern and hybrid operating models, Software-as-a-Service, regulatory requirements, working from home, various types of internal and external users, and the phenomenon of BYOD (bring your own device) are challenges we have to face today. Such challenges are constantly emerging, which…
Blog
KuppingerCole Analyst Chat: Cybersecurity Portfolio Optimization
May 15, 2020
Matthias Reinwarth and Christopher Schütze talk about how to efficiently identify and rate your investments into Cybersecurity.
Free Analyst Advice: Business Resilience Management (Crisis Roadmap for Beginners)
Blog
3 Steps to Improve Your Cybersecurity with Enterprise Risk Management
May 14, 2020
If you start considering the topic of cybersecurity in your company, you’ll quickly realize that there are many facets. In traditional companies, IT has grown in parallel to meet the requirements in digitization and production in a timely manner.
These traditional companies and…
Blog
KuppingerCole Analyst Chat: Incident Response Management
May 11, 2020
Christopher Schütze and Matthias Reinwarth explain the importance of having an incident response plan.
Latest videos
Analyst Chat
Analyst Chat #143: Vulnerability Management: Emergency Patching and How to Deal with "Zero Days"
October 03, 2022
Sometimes Vulnerability Management has to take care of current threats very quickly: Christopher Schütze is today's guest in this episode and explains which processes are necessary when a system needs to be updated very quickly, for example because there is a current threat, e.g. a…
Analyst Chat
Analyst Chat #94: From Ransomware to Globally Assured Identities (EIC 2021 Special)
September 20, 2021
EIC 2021 finally took place in Munich in a hybrid format between on-site and online. Of course, Matthias took the opportunity to sit down with his analyst colleagues in person for some EIC special analyst chat episodes. In the first of three specials, Christopher Schütze talks to him about…
Analyst Chat
Analyst Chat #91: Vulnerability Management
August 30, 2021
Christopher Schütze provides the fundamentals for a pivotal topic in cybersecurity, namely how to create processes and systems for comprehensive and continuously improving vulnerability management. Together with Matthias, he provides an overview of elementary aspects that need to be…
Webinar Recording
Accelerate Your Digital Transformation Through Identity
June 30, 2021
Employee Identity & Access Management (IAM) and Consumer Identity & Access Management (CIAM) are typically separate in terms of governance, processes, and technology. But, by leveraging the synergy between the two, businesses can achieve better sales opportunities as well as faster…
Event Recording
Exploring the Intersection of ITSM and ServiceNow
June 23, 2021
Christopher provides a deep-dive on the intersection of ITSM and ServiceNow
Webinar Recording
Die Angriffsfläche Ihres Unternehmens aus den Augen eines Hackers
May 07, 2021
Mit zunehmender Digitalisierung und der Nutzung von Cloud-Services steigt das Angriffspotenzial auf die digitale Infrastruktur von Unternehmen. Hacker nutzen neuste Technologien, um Schwachstellen ausfindig zu machen und starten mit diesem Wissen Ihre Angriffe.