Kudelski Security
FR DE
ModernCiso
  • Blogs
    • Advisory Services
    • Application Security
    • Artificial Intelligence
    • Blockchain
    • CISO
    All Blogs
    Advisory Services
    Bookmark
    Modern Software Supply Chain Attacks: Trust, Risk, and How to Defend Against Hidden Threats
    6 minutes read
    Advisory Services
    Bookmark
    The Growing Need for Outsourcing Compliance Services: How Compliance-as-a-Service (CaaS) Solves GRC Challenges
    5 minutes read
    Blockchain
    Bookmark
    ZKML: Verifiable Machine Learning using Zero-Knowledge Proof
    8 minutes read
  • ModernCISO Basics
    • Blockchain
    • Cloud
    • Pentesting
    • Network Security
    • Risk Management
    All Basics
    Pentesting
    Bookmark
    What is Penetration Testing?
    6 minutes read
    Pentesting
    Bookmark
    Red Team vs Penetration Testing: What’s the Difference?
    5 minutes read
    Pentesting
    Bookmark
    Red Team vs Blue Team: What’s the Difference?
    6 minutes read
  • ModernCISO Minute
    • Blockchain Cybersecurity
    • Incident Response
    • Digital Transformation
    • Crisis Response Analysis
    All ModernCISO Minutes
    Vulnerability Management
    Bookmark
    Leveling Up Vulnerability Management
    What to Expect
    Bookmark
    What to Expect from an MDR Provider
    Strategic Platform Security
    Bookmark
    The ModernCISO Minute: Strategic Platform Security
  • ModernCISO Guides
    • Advisory
    • Managed Detection and Response
    All Guides
    Advisory
    Bookmark
    The ModernCISO Guide to NIS2
    Advisory
    Bookmark
    The ModernCISO Guide to Zero Trust for Microsoft
    Advisory
    Bookmark
    The Four Step Framework for Managing Insider Risk
  • Subscribe
  • Blogs
  • Basics
  • ModernCISO Minute
  • ModernCISO Guides
Subscribe to the ModernCISO Blog
Subscribe to get regular updates from the ModernCISO Blogs. Insights from our cybersecurity experts are only a few clicks away.
  • Services
        • Advisory

          Amplify the effectiveness of your team and resources by partnering with our cybersecurity advisors.

          Learn More

        • Technology Optimization

          Design, build and run an optimal security technology environment with our reference architectures.

          Learn More

        • Managed Security

          Combining advanced fusion capabilities with human expertise to detect and respond to threats faster.

          Learn More

        • Managed Detection and Response

          Customized, rapid threat detection and response services for any environment, 24/7.

          Learn More

        • Emerging Technology Security

          Our multi-disciplinary teams help secure new frontiers for your business and deliver the most valuable commodity of all: trust.

          Learn More

        • Incident Response

          Prepare for cyber attacks with support from our Advisory and MSS teams.

          Learn More

  • Solutions
        • By Capability

          From strategic program management to intensive device testing, we help build world-class cybersecurity programs from the ground up.

          Learn More

        • By Industry

          Building and maintaining powerful cybersecurity programs with a deep understanding of industry-specific threat actors.

          Learn More

        • By Need

          Delivering cutting-edge cybersecurity solutions and services that are tailored to the precise needs and objectives of our enterprise partners.

          Learn More

  • Industries
        • Financial Services

          Protect financial records and ensure compliance with industry-leading threat detection.

          Learn More

        • Government

          Guarantee the security of sensitive assets and data with cutting-edge security capabilities.

          Learn More

        • Manufacturing

          Stay ahead of cyber threats with cost-effective security services and solutions.

          Learn More

        • Healthcare Industry

          Adopt a proactive approach to cybersecurity that better protects IT infrastructure and data.

          Learn More

        • Energy and Utilities

          Build cybersecurity programs that can defend highly complex network architectures.

          Learn More

        • Retail

          Win consumer trust and loyalty by achieving long-term compliance and customer security.

          Learn More

        • Software and Internet Services

          Keep your software and internet services updated and secure to ensure they can withstand sustained cyber attacks.

          Learn More

        • Download the Operational Technology eBook

          Download now

  • Resources & Events
        • Resources
          • All Resources
          • eBooks
          • Reference Architecture
          • Research Reports
          • Webinars
          • Factsheets
        • Events
          • Upcoming Events
        • Knowledge Center
          • Blockchain Report Archive
          • Threat Alert Center
          • Research
          • ModernCISO
  • Partnerships
        • Alliance Partners

          Maintaining a network of strategic partnerships and alliances that promote the industry and bring added value to our clients.

          Learn More

        • Technology Partnerships

          Explore our community of technology partners.

          Learn More

        • Strategic Alliances

          Partner with Kudelksi Security to protect your clients' vital assets with a portfolio of innovative cybersecurity services and solutions.

          Learn More

        • Texas DIR

          Providing statewide leadership and oversight for management of government information and communications technology.

          Learn More

  • Company
        • Why Us?
          • The Kudelski Security Advantage
          • Awards & Accolades
        • About Us
          • Our Story
          • Our Heritage
          • Leadership Team
          • Careers
          • Practice Leaders
          • Certifications
        • News
          • Press Releases
        • Contact Us
          • Locate Us
          • Report an Attack
          • Request an MSS Portal Demo
  • Blogs
    • ModernCISO
    • Kudelski Security Research

ModernCISO Minute

Powered by Kudelski Security
  • Filter by

  • Filter by

ModernCISO Minute

Our experts give their points of view on what’s interesting in the cybersecurity space.
Vulnerability Management
Leveling Up Vulnerability Management
Kudelski Security's Director of Security Operation and Advisory Services, Steven Bay, shares two essential tips to enhance your vulnerability management program. Tip 1: Master Your Asset Inventory (CMDB) and Tip 2: Integrate a Strong ITSM System.
1 minute read
Vulnerability Management
Share this Video
Share this blog
Bookmark
Add to CISO Clips & Read Later
What to Expect
What to Expect from an MDR Provider
Delphine Guex, Kudelski Security's Senior Director for Managed Detection and Response EMEA, discusses the six key capabilities customers expect from an MDR provider. Watch and learn how these competencies can enhance your organization's security
1 minute read
What to Expect
Share this Video
Share this blog
Bookmark
Add to CISO Clips & Read Later
Strategic Platform Security
The ModernCISO Minute: Strategic Platform Security
Technology Consultant and Microsoft MVP, Chris Goosen, discusses the advantages of best in platform security strategies over best of breed point solutions. He highlights the extensive security capabilities within existing productivity or infrastructure
1 minute read
Strategic Platform Security
Share this Video
Share this blog
Bookmark
Add to CISO Clips & Read Later
SOAR
The ModernCISO Minute: SOAR
Kudelski Security's Renaud Cona, a Director within the Advisory team, dives into the significance of SOAR (Security, Orchestration, Automation, and Response) and its role in enhancing incident response efficiency. Discover how automation can
1 minute read
SOAR
Share this Video
Share this blog
Bookmark
Add to CISO Clips & Read Later
Cyber Threat Intelligence
The ModernCISO Minute: Cyber Threat Intelligence
Loïs Diserens, a T1 Security Analyst at Kudelski Security, emphasizes the critical role of Cyber Threat Intelligence (CTI) in boosting cybersecurity. He explains how CTI fosters collaboration, swiftly identifies attack elements, and provides essential
1 minute read
Cyber Threat Intelligence
Share this Video
Share this blog
Bookmark
Add to CISO Clips & Read Later
Technical Debt
The ModernCISO Minute: Technical Debt
Technology Consultant and Microsoft MVP, Chris Goosen, discusses the impact of rapid technology deployment due to the COVID pandemic and the challenges of managing technical debt. He emphasizes the need for evolving systems, processes, and policies to
1 minute read
Technical Debt
Share this Video
Share this blog
Bookmark
Add to CISO Clips & Read Later
Security Awareness Training
The ModernCISO Minute: Security Awareness Training
Is security awareness training software useless? Kudelski Security's Sanda Haas Würmli explains why a tool is just a tool unless you make it
1 minute read
Security Awareness Training
Share this Video
Share this blog
Bookmark
Add to CISO Clips & Read Later
Challenges of the MDR Model
The ModernCISO Minute: Challenges of the MDR Model
Kudelski Security's Sr. Director of Managed and Detection Response Services, EMEA, explores the top eight challenges the current Managed Detection and Response (MDR) model
1 minute read
Challenges of the MDR Model
Share this Video
Share this blog
Bookmark
Add to CISO Clips & Read Later
Mistakes in Vulnerability Management
The ModernCISO Minute: Mistakes in Vulnerability Management
Steven Bay, from Kudelski Security’s Global Advisory team, highlights the critical role of vulnerability management in building resilience. Over-reliance on scanning tools and not prioritizing vulnerabilities are common pitfalls. Steven explains why
1 minute read
Mistakes in Vulnerability Management
Share this Video
Share this blog
Bookmark
Add to CISO Clips & Read Later
Building a SOC
The ModernCISO Minute: Building a Security Operations Center
Delphine Guex shares her experiences from building a security operation center in Madrid. From the top three challenges she faced to why it's so important to make a decentralized team feel part of the larger group, this episode is a must-watch for anyone
1 minute read
Building a SOC
Share this Video
Share this blog
Bookmark
Add to CISO Clips & Read Later
Technology Rationalization
The ModernCISO Minute: Technology Rationalization
Kudelski Security's Suk Paul discusses how your organization can rationalize its significant technology investments in our latest ModernCISO
1 minute read
Technology Rationalization
Share this Video
Share this blog
Bookmark
Add to CISO Clips & Read Later

Get in touch now

Subscribe to the ModernCISO blog
  • Services
    • Advisory
    • Technology Optimization
    • Managed Detection and Response
    • Managed Security
    • Applied Security
    • Incident Response
  • Solutions
    • By Capability
    • By Industry
    • By Need
  • About Us
    • Our Story
    • Our Heritage
    • Our Team
    • The Kudelski Security Advantage
    • Partners
    • Careers
    • Press Releases
    • Certifications
  • Resources
    • All Resources
    • Research Blog
    • Modern CISO
  • Company Information
    • Terms of sale
    • Terms & Conditions
    • Privacy Notice
  • Contact Us
    • Locate Us
    • Talk to Our Experts
© Copyright Kudelski Security 2025. The Cybersecurity Division of the Kudelski Group
Kudelski Security - LinkedIn Kudelski Security - Twitter Kudelski Security - YouTube Kudelski Security - Facebook Kudelski Security - GitHub