Upcoming events and webinars
September 18-19, 2024 | Prague, Czech Republic
2nd Client Onboarding and Digital Identity Summit for Financial Institutions
November 5-6, 2024 | Berlin, Germany
TISP/TPSSE Community Meeting 2024
Join our expert presentation on "Quantum-sichere Verschlüsselung: Beispiele praktischer Anwendungen - Das Warum, Wie und Wann für eine sichere digitale Kommunikation" by Dietmar Wyhs, Branch Manager (DACH & CEE) at SSH Communications Security.
On November 5, 2024 at 15:30-17:30.
March 21, 2024 | Munich, Germany
CyberSec Munich
Join our afternoon Solution Spotlight #4 "Zero Trust: Password- & Key-less Securing of Critical IT/OT Infrastructure in the Context of NIS 2.0/DORA/IEC 62443 presented by Dietmar Wyhs, Sales Director DACH & CEE at SSH Communications Security.
The NIS 2.0 directive must be implemented by 17 October 2024. Zero Trust also plays a key role here. This is not the only reason why it is very important for companies to ensure the “management of privileged access, credentials and access at administrator level and the path to a password- & key-less environment” – not only but also for the controlled access of partners, suppliers, and others. In the presentation, we will show you which options are provided by SSH and how they support the Zero Trust approach.
April 16, 2024 | 4pm (EEST) | Online
OT Cybersecurity Talk: SSH & Stora Enso
Join us and Stora Enso for our expert webinar on April 16 at 4 PM (EEST).
The discussion will cover topics such as risk management, safety protocols, and productivity optimization of OT environments. We'll also talk about challenges such as difficulty in securing OT access, Just-Enough-Access (JEA) and Just-in-Time (JIT), too broad access with VPNs, and the issue of insufficient visibility, recording, and auditing.
The speaker line-up includes:
- Rami Raulas, Interim CEO at SSH
- Juha Suominen, Service Delivery Manager at Stora Enso
You'll learn how to:
- Establish strong identity and access management (IAM) solutions in OT
- Address challenges posed by legacy systems and the growing trend of cloud adoption
- Dissect crucial components of OT cybersecurity, from network infrastructure to end-point control
- Explore the functionality and importance of Privileged Access Management (PAM) in OT, including the roles of approvers and other key aspects
- Tackle challenges that may come when implementing IAM solutions
- Integrate your Microsoft Entra environment with your PAM solution
Recordings of past events & webinars
October 4, 2022 | Expert roundtable
Key elements of an effective OT cybersecurity strategy
Learn from the industry experts Tim Conway, Roman Sologub, and Rami Raulas about effective threat detection and response, OT network resilience, and how to build an OT security strategy.
JUNE 28, 2022 | Expert roundtable
How is Ukraine defending itself against cyberattacks?
Four cybersecurity experts come together to discuss lessons learned from the currently ongoing cyberwar in Ukraine and how businesses can put these learnings into practice to defend themselves.
March 29, 2023 | ssh event
Customer Advisory Board 2023: Credential-less is more
SSH's leadership and experts got together with some of our most prominent customers and guest speakers to talk about the future of cybersecurity, the future of SSH as a company, cybersecurity trends 2023, and more. Watch some of the most important moments and presentations of the event.
May 26, 2023 | EXPERT WEBINAR
SSH webinaari: Kyberturvallisen viranomaisviestinnän tulevaisuus?
Note that the webinar was held in Finnish.