Kudelski Security-Ressourcen-Center
Willkommen in unserem Ressourcen-Center. Hier finden Sie Broschüren, Datenblätter und Videos zu unseren Services und Lösungen für Cybersicherheit. Sie können die Bibliothek nach Kategorie und Thema durchsuchen.

164 Results

Factsheets
MDR ONE Resolute
Reach a higher state of resilience with 24/7 risk-based threat detection, investigation, and response.

Webinar
ModernCISO Webinar | Managed Detection & Response (Spanish)
Best Practices and Advices for Successfully Navigating Cybersecurity Challenges in 2024.

ModernCISO Guide
7 Key Things a Good RFP Should Cover When Engaging an MDR Provider
We’ve identified seven key considerations to keep in mind when evaluating an MDR provider.

Webinar
ModernCISO Webinar | Explore NIS2 & OT Security
In this webinar with our partner Claroty we will discuss essence and impact of the NIS2 directive for essential and important entities.

Quick Reference Guide
An Introduction to Next-Generation MDR
Actionable Insights Into Extended Detection and Response: Your XDR Guide

Webinar
ModernCISO Webinar – Frontline Stories | Cyber War Gaming (French)
Cyber War Gaming is a unique and effective method for assessing and enhancing preparedness for a cyber attack by simulating a customized scenario. To gain a better understanding of the objectives, learn about the key steps, and understand the major challenges involved in this exercise, benefit from the experience of Rémi Lecoupé-Grainville, DSI at Havas.

Webinar
ModernCISO Webinar – Frontline Stories | Risk-Based Vulnerability Management
Most cyber attacks exploit known vulnerabilities that could have been mitigated by the regular application of security patches or software updates. What are the best practices for identifying vulnerabilities, prioritizing and managing them as effectively as possible?

Quick Reference Guide
A Security Leader’s Guide to Navigating the Breach – Lessons from an Equifax CIO
A Quick Reference Guide with "Top Lessons from the Equifax Data Breach" from basic cybersecurity hygiene to preparing key stakeholders on what to do when the breach happens.