Kudelski Security Resource Center
Welcome to our Resource Center. Here you’ll find brochures, data sheets, and videos covering our cybersecurity services and solutions. Search the library according to category and topic
24 Results
Webinar
The Divergence and Convergence of IT & OT – Webcast
This presentation focuses on the IT-OT Convergence challenge many industries face as we move toward a cyber digital transformation.
Webinar
Webcast: The Evolution of Ransomware – Detection and Remediation Techniques
Download this webcast to learn about the latest development of ransomware and how to protect your organisation.
Webinar
Easy as “Pi” Virtual Cloud Automation Webcast
This presentation features F5's latest Cloud Services and how you can build out a DevOps pipeline with cloud-based WAF, DNS and Beacon (Application Metrics).
Videos, Webinar
Webinar: 20/20: Adapting Cyber Operations for Data Visibility
The need for business agility has rarely been as apparent as it is today. The ability to securely adapt IT systems to the current business climate has challenged even the most agile organizations.
Research Reports, Videos, Webinar
Are you ready for the era of quantum computing?
Quantum computing and security in a nutshell - what you need to know to be better prepared.
Videos, Webinar
Cloud Migration: A CISO’s Perspective Panel Discussion on How to Nail the Cloud
What's your cloud journey looking like? Get ideas for an even better approach to cloud migration and management.
Videos, Webinar
How CISOs Gain Trust in the Boardroom – Webcast
Gartner states that cybersecurity now ranks fourth as a board meeting topic discussion. Every CISO now has to talk about integrated risk management and cybersecurity in a way that resonates. Download the webcast for practical advice on how to nail the conversation.
Webinar
Office 365 Threat Landscape & Kill Chain
85% of Kudelski Security incident response engagements in 2019 involved Office 365 compromises. Download the webcast to learn about current Microsoft Office 365 compromise tactics across the attack kill chain.