Kudelski Security Resource Center
Welcome to our Resource Center. Here you’ll find brochures, data sheets, and videos covering our cybersecurity services and solutions. Search the library according to category and topic
154 Results
Webinar
ModernCISO Webinar | Explore NIS2 & OT Security
In this webinar with our partner Claroty we will discuss essence and impact of the NIS2 directive for essential and important entities.
Quick Reference Guide
An Introduction to Next-Generation MDR
Actionable Insights Into Extended Detection and Response: Your XDR Guide
Webinar
ModernCISO Webinar – Frontline Stories | Cyber War Gaming (French)
Cyber War Gaming is a unique and effective method for assessing and enhancing preparedness for a cyber attack by simulating a customized scenario. To gain a better understanding of the objectives, learn about the key steps, and understand the major challenges involved in this exercise, benefit from the experience of Rémi Lecoupé-Grainville, DSI at Havas.
Webinar
ModernCISO Webinar – Frontline Stories | Risk-Based Vulnerability Management
Most cyber attacks exploit known vulnerabilities that could have been mitigated by the regular application of security patches or software updates. What are the best practices for identifying vulnerabilities, prioritizing and managing them as effectively as possible?
Quick Reference Guide
A Security Leader’s Guide to Navigating the Breach – Lessons from an Equifax CIO
A Quick Reference Guide with "Top Lessons from the Equifax Data Breach" from basic cybersecurity hygiene to preparing key stakeholders on what to do when the breach happens.
Quick Reference Guide
A Board Member’s Guide to Navigating the Breach
Key considerations and the questions you should be asking your senior management before, during, and after a breach.
ModernCISO Guide
The ModernCISO Guide to Zero Trust for Microsoft
This guide will take you through the essentials of building out Zero Trust within a Microsoft environment.
Infographics
OT Cybersecurity Recommendations
Organizations must implement and continually monitor technologies, policies, and procedures to help protect their environment and protect against known and emerging threats.