Regular live & on demand webinars for CISOs and IT professionals
Centrify’s channel provides webinars that will inform and educate on topics including securing AWS, privileged access and identity management, MFA, SSO, GDPR and IDaaS, with input from analysts including KuppingerCole, and law firm Cordery Law. Our speakers include Barry Scott, our CTO, Corey Williams, Senior Director of Product Management and Marketing, Centrify, Larry Ponemon – Chairman and Founder, Ponemon Institute and Martin Kuppinger.
La sécurité doit non seulement être simple mais doit aussi aider les différents métiers d’une entreprise à être plus efficient.
Dans des environnements où le cloud et la mobilité deviennent la norme, comment réduisez-vous les risques associés à ses usages tout en augmentant la productivité ?
Durant ce webinaire nous allons vous présentez la plateforme Zéro Trust de Centrify et comment nous pouvons unifier la gestion des accès, des habilitations, la traçabilité en tenant des différents contextes d’usages et des facteurs risque qui y sont associés.
Ian Stimpson, Systems Engineer.Recorded: Sep 13 201820 mins
Zero Trust Security is quickly rising as a preferred alternative to traditional security approaches. Traditional security perimeters are no longer compatible with today’s business models as both corporate assets and users are increasingly outside the perimeter, while targeted, advanced threats are shifting inside.
During this live webinar, our expert, Ian Stimpson, will provide a high level overview of the Zero Trust model and discuss some of the most pressing security issues facing organisations today. Ian will demonstrate how adopting a Zero Trust security approach can help you overcome these challenges and increase your security posture, whilst improving the user experience.
Explore the Zero Trust approach to security and watch product demonstrations to learn how Centrify:
Verifies the User, ensuring authenticity of every user before access to a resource is ever granted.
Validates the Device, enabling access from trusted devices only, minimising endpoint threat vectors and increasing endpoint security posture.
Limits Access and Privilege, minimising the attack surface, limiting lateral movement and reducing breach-related damage.
Rhonda Shantz, Centrify CMO and Bill Mann, Centrify Chief Product OfficerRecorded: Aug 17 20187 mins
There is a lot of noise in the market place, with over 100 companies talking about Zero Trust.
However, there's only one company whose entire product line, and whose position in the market place is Zero Trust Security, and that's Centrify.
In this 7 minute video, Centrify CMO Rhonda Shantz talks about the 'noise' in the market place, and how this is fuelling misconceptions as to what the real problem actually is, and why, despite billions of spending on cybersecurity, 66% of companies are still being breached.
This is followed by a summary overview of the 4 pillars of the Centrify Zero Trust model; Verify the User, Validate the Device, Limit Access and Privilege and Learn and Adapt, delivered by Centrify's product experts.
Barry Scott, CTO Centrify EMEARecorded: Aug 17 201830 mins
Yahoo, Equifax and Uber are just some of the high-profile brands hit by breaches during the past twelve months but could it be younger workers that pose the biggest risk to an organisation's IT security?
Centrify surveyed 1000 UK office workers aged 18 to 24 and 500 UK senior decision makers to measure what the decision makers think of the next generation workforce’s approach to security and compare it to real-world attitudes.
Is there a significant gap between perception and reality in decision makers view of younger workers? The results may surprise you!
In this podcast, Centrify's CTO Barry Scott and SC Media's Editor-in-Chief Tony Morbin discuss the next generation of workers and how their behaviour could impact the workplace.
After listening to the podcast, don't forget to download the full report.
More than 5 million data records are lost or stolen worldwide every single day, according to the Breach Level Index. That’s a staggering 59 records every second. According to the Ponemon Institute, to recover from these incidents, organizations spent on average $3.6 million per breach. It’s also worth remembering the potential for reputational damage that can create a downswing in an organization’s fortunes. For example, Yahoo!’s data breach proved very costly, wiping out $350 million off Verizon’s acquisition payment.
Thus, it has become critical for organizations to find ways to reduce the risk of falling victim to a breach, as well as reduce complexity and cost in securing applications, devices, and infrastructure ― both on-premise and in the cloud.
Join this webinar to learn:
• How to assess the full impact of data breaches, ranging from direct costs, reputation damage, and customer loss to declines in revenue.
• How misperceptions linked to the root cause of hacking-related breaches skew IT security spending and how to align your security investments to achieve higher effectiveness.
• How the Zero Trust Security model can help shield your organization and its reputation from devastating and long-term financial consequences of a breach.
Barry Scott, CTO Centrify EMEARecorded: Jul 3 201841 mins
More than 5 million data records are lost or stolen worldwide every single day, according to the Breach Level Index. That’s a staggering 59 records every second. With the scares of WannaCry and Petya, your board is asking, “what the hell are we doing to protect ourselves?” You need answers. The problem, highlighted in a recent WSJ study, showed that 62% of CEOs incorrectly cite malware as the primary threat to cybersecurity, whereas CIOs, CISOs, CTOs realize that 68% of breaches would have been prevented by identity security, vs. only 8% for anti-malware. In fact, the 2017 Verizon Breach Investigations Report found that 81% of breaches were due to lost, stolen or default passwords.
Your board wants to know what you’re doing about ransomware, but rather than randomly chasing the latest newsworthy incident. present a strategic Zero Trust Security plan that addresses the real issue and defines a practical and proven direction that not only protects against breaches, but also enables your business the freedom to transform and grow in spite of the growing threatscape.
Join this webinar to learn:
• What is the real threat that must be addressed to protect you from breaches.
• What is Zero Trust Security and how does it address the modern threatscape?
• Who else is talking about Zero Trust Security and what have they been able to achieve?
• How to talk to your board about a consistent and strategic approach rather than reactive and defensive.
Amar Singh (CMA) | Barry Scott (Centrify) | Nick Bilogorskiy (Juniper Networks) | Raef MeeuwisseRecorded: Jun 6 201845 mins
Data breaches are on the rise, affecting millions of people around the world. With personal information exposed to cyber criminals and up for sale, the impact of a breach can continue to haunt its victims for months, and even years to come.
Join top security experts for this interactive Q&A panel as they discuss:
- The current (broken) state of security and the role identity plays in cyber-attacks
- Zero trust framework: Guiding principles and paradigms
- The massive rethink underway that redefines security to follow identity
- What you can do today to adopt a Zero Trust model and reduce risk through the power of next-gen access
- Recommendations for prevention of data breaches
- Amar Singh, CEO & Founder, Wisdom of Crowds, Cyber Management Alliance
- Barry Scott, CTO – EMEA, Centrify
- Nick Bilogorskiy, Cybersecurity Strategist, Juniper Networks
- Raef Meeuwisse, ISACA Expert Speaker & author Cybersecurity for Beginners
The session will be streamed LIVE from London from the Infosecurity Europe conference.
Garrett Bekker, Principal Analyst, 451 Research and Bill Mann, Chief Product Officer, CentrifyRecorded: Apr 30 201838 mins
Today’s digital transformation initiatives have substantial consequences for a company’s overall security posture, potentially impacting both security architectures and attack surface. Traditional security perimeters are no longer compatible with today’s business models as both corporate assets and users are increasingly outside the perimeter, while targeted, advanced threats are shifting inside. Adopting a Zero Trust Security model centers on the belief that untrusted actors already exist both inside and outside the network, and that identities and endpoints must be verified and validated in order to grant conditional policies to govern access.
Join Bill Mann, Centrify’s Chief Product Officer, and Garrett Bekker, Principal Analyst at 451 Research, in a lively discussion around how Zero Trust concepts can be applied to Identity and Access Management, empowering organizations to better secure and control access in an integrated and seamless fashion and ultimately limiting the risks associated with identity theft and cyberattacks.
Attendees will also takeaway:
•Top challenges and perspectives in implementing Zero Trust Security
•The latest statistics on how breaches happen and why Zero Trust Security is important
•Practical takeaways around how to start your Zero Trust Security journey with Next-Gen Access
Chase Cunningham, Forrester Principal Analyst and Corey Williams, Centrify Senior Director of ProductsRecorded: Apr 19 201851 mins
While Zero Trust Security is quickly rising as a preferred alternative to traditional security approaches, medium-sized enterprises may perceive this strategic approach as being too complex, expensive or require unavailable skillsets to accomplish. Nothing could be further from the truth. Zero Trust Security is perhaps the best approach to simplify security, make it not only achievable but (relatively) affordable and allow you to get on with what you do best knowing that your security is up to date with the best thinking in the industry.
Join guest speaker Chase Cunningham, Forrester Principal Analyst and Corey Williams, Centrify Senior Director of Products, to hear how the Zero Trust Security approach can be applied to any size enterprise.
Chase and Corey will also discuss:
•How a Zero Trust Security strategy is just what the medium-sized enterprise (security) doctor ordered
•The fact that modern security technologies are easier than ever to acquire and deploy, especially for “born-in-the-cloud” organisations
•How Next-Gen Access integrates many of the foundational capabilities you need to achieve Zero Trust Security
Chase Cunningham, Forrester Principal Analyst and Tom Kemp, Centrify CEORecorded: Apr 12 201858 mins
Zero Trust Security is quickly rising as a preferred alternative to traditional security approaches. The key enabling technology underlying the Zero Trust Security approach is Next-Gen Access which combines the key capabilities of such technologies as Identity as a Service (IDaaS), Enterprise Mobility Management (EMM) and Privileged Access Management (PAM). This integrated combination of capabilities underlies the key pillars of Zero Trust Security – verify every user, validate their devices and limit their access and privileges.
Listen to our guest speaker Chase Cunningham, Forrester Principal Analyst and Tom Kemp, Centrify CEO, to hear how Next-Gen Access arose from the need to protect against the most common attack vector – compromised credentials.
Chase and Tom will also discuss:
•The importance of Next-Gen Access in combating today’s cyber threats
•Tips on selecting and implementing Next-Gen Access in your organisation
•The unique benefits of Next-Gen Access including reduced complexity and cost as well as better visibility and control