Hi [[ session.user.profile.firstName ]]

Security Management

  • Date
  • Rating
  • Views
  • A NIST Guide on How Identity Management is Reshaping Cyber Security
    A NIST Guide on How Identity Management is Reshaping Cyber Security Bill Newhouse, Deputy Director, NICE; Naresh Persaud, Sr. Dir. Security; Prod Mktg, CA; Spencer Wilcox; Brandon Dunlap Recorded: Oct 12 2017 60 mins
    Did you know that 80% of data breaches implicate lost, stolen and weak credentials, as well as excessive access as culprits? NIST’s National Cybersecurity Center of Excellence (NCCoE) is helping companies better understand how to apply standards-based, commercially available technologies to improve their cybersecurity posture. The NCCoE’s security control mappings, reference designs, and lab implementations can be used as roadmaps or checklists for organizations looking to bolster their cybersecurity programs. Join CA and (ISC)2 on October 12, 2017 at 1:00PM Eastern for our ThinkTank where our expert panel will take an in depth look at how Identity Management is shaping the recommendations and requirements for the next generation of cyber security controls.
  • Protect Your Data Privacy with Data-Centric Security
    Protect Your Data Privacy with Data-Centric Security Stuart McIrvine Vice President, Mainframe Security Product Management Recorded: Sep 27 2017 42 mins
    Data privacy isn’t an easy task, you need to ensure the security of sensitive information while complying with a variety of regulations. But data privacy never ends and the laws are constantly changing. The answer? A data-centric security strategy covers all corporate data, so you can connect everyone to everything while staying in complete control. The challenge? Knowing where all your mainframe data is located, how it’s being used, who has access to it, and whether it’s compliant with industry regulations.
    Join Stuart McIrvine, Vice President of Mainframe Security Product Management to cover the foundation of building data-centric security strategies that cover all corporate data, simplify regulatory compliance, and outline how to leverage security as a competitive advantage, from mobile to mainframe.
  • How to Jump Start GDPR with Identity & Access Management. Hosted by ISACA
    How to Jump Start GDPR with Identity & Access Management. Hosted by ISACA Christian Almskou, Senior Partner, ICY Security & Paul Ferron, Director Digital Identity Strategy, CA Technologies Recorded: Sep 27 2017 54 mins
    More than 50% of businesses today don't have a strategy to address the European General Data Protection Regulation (GDPR). For companies that fail to comply, the cost can be high - as much as 4% of annual turnover. Take control. Learn the steps to successfully implement GDPR.

    Join Christian Almskou, Senior Partner ICY Security and Paul Ferron, Director Digital Identity Strategy, CA Technologies as they share perspectives on how to:
    •Put breach notifications in place
    •Establish repeatable controls and governance
    •Prevent data breaches from happening

    Join us for this informative peer session to help jump start GDPR.
  • Shoring up Your Defenses by Leveraging Analytics and Machine Learning
    Shoring up Your Defenses by Leveraging Analytics and Machine Learning Mark McGovern, VP, Product Mgmt., CA; John Carnes, Infosecurity Senior Adviser, Anthem; Erik Von Geldern, FXCM Recorded: Aug 24 2017 65 mins
    Attackers are getting quicker and more sophisticated. Today's enterprise defenders aren’t able to withstand the pace and complexities of the threats they face. Automated tools and intelligence are being deployed to breach your IT infrastructure and access your priceless data by targeting privileged accounts. In playing defense, security teams must become proactive, not reactive and use data and analytics in a meaningful way, being more effective and agile in detecting attackers and quickly thwarting them. Join CA Technologies and (ISC)2 on August 24, 2017 at 1:00PM Eastern for a discussion on emergence of machine learning and security analytics as tools that organizations can leverage to defend their data and some practical ways it can be used to protect key assets such as privileged accounts.
  • Live Demonstration of CA Privileged Access Manager
    Live Demonstration of CA Privileged Access Manager John Christensen Recorded: Aug 23 2017 22 mins
    Join us for a live demo of CA PAM. We'll highlight key features & functions as well as show you standard use cases.
  • Destination: 3-D Secure 2.0 - Hosted by PYMNTS.com
    Destination: 3-D Secure 2.0 - Hosted by PYMNTS.com Ankur Karer, Director of Payment Security Presales, CA Technologies Recorded: Aug 18 2017 61 mins
    After a 17-year journey through hardships & learning experiences, 3-D Secure is finally undergoing a much-needed overhaul. EMVCo has released EMV 3-D Secure 2.0 (3DS 2.0); optimized for mobile and traditional web browser transactions.

    The new protocol delivers important additional e-commerce transaction metadata, including an extensive set of device data. This enhanced data will facilitate even greater fraud prevention gains for customers, who participate in cardholder authentication programs based on 3-D Secure.

    Join Ankur Karer, Director of Payment Security Presales at CA Technologies to learn how 3-D Secure 2.0 is poised to change online payments authentication.
    • Discover the key drivers that influenced this indisputable transformation
    • Evaluate the important benefits for mobile and in-app purchases
    • Analyze the significant new data elements to combat fraud
  • We Need a Trust and Transparency Model for The Internet of Things
    We Need a Trust and Transparency Model for The Internet of Things Sean Martin, ITSPmagazine | David Billeter and Naresh Persaud, CA Technologies | Mandeep Khera Recorded: Aug 16 2017 64 mins
    Today, security on the Internet is dependent on the trust between participants on the network. This is challenging because trust involves more than humans in this case and there are over 8.7 Billion devices already online today. And, trust is about to become more involved because, according to a Cisco study, 99% of the things in the world today will be connected to the Internet in the near future which means we will need a new model for trust and digital identity to manage this massive scale of trust we will need.

    In this ITSPmagazine webinar, a panel of subject matter experts will explore the challenges and solutions to building trust on the Internet of things, looking at what identity means in the world of mobile devices and other Internet-connected things. Remember, it's not just the user that has an identity...

    Some of the topics planned for the discussion include:
    - What are some of the devices we see being used in business?
    - Why do devices need identities?
    - What does device-to-user authentication look like?
    - What does device-to-device authentication look like?
    - What role do applications play in the IoT world?
    - How can all of these identities and activities be managed and policies enforced at scale?

    --------

    Moderator
    - Sean Martin, CISSP, Editor-in-Chief at ITSPmagazine

    Expert Panelists
    - David Billeter, CISO at CA Technologies
    - Mandeep Khera, Information Security Thought Leader and Executive
    - Naresh Persaud, Sr. Director Security, Product Marketing, CA Technologies
  • Securing the Connected Mainframe
    Securing the Connected Mainframe Jeff Cherrington, Senior Director Product Mgmt at CA Technologies, Deb Gannaway, Technology Executive at DG Technologies Recorded: Jun 7 2017 57 mins
    Over 62% of security professionals don’t know where all their sensitive data is – do you? The challenge is that the mainframe hosts most of the world’s mission-essential, regulated corporate data and interconnects with everything else in your business - making it more vulnerable to threat than ever before.

    Join Jeff Cherrington, Senior Director of Product Management at CA Technologies and Deb Gannaway, Technology Executive at DG Technologies on June 7th at 2pm EST to learn how to:

    • Find lost, abandoned and even hidden data on your mainframe
    • Classify data based on regulation or sensitivity level to satisfy compliance
    • Protect mainframe data to stay in full control of critical business assets

    Is your as mainframe secure as it should be? Identify the vulnerabilities
  • Stop Fraud Instantly & Reduce CNP Fraud Loss by 25% - hosted by PYMNTS.com
    Stop Fraud Instantly & Reduce CNP Fraud Loss by 25% - hosted by PYMNTS.com James Rendell, VP Payment Security, CA; Paul Dulany, VP Data Science, CA; Karen Webster, CEO MPD Recorded: May 25 2017 59 mins
    Too often card issuing banks suffer significant loss from fraudsters stealing credit card credentials. Typically, these fraudsters use multiple cards from multiple issuers to complete purchases from a single device before the stolen cards can be blocked. The goal is to immediately identify and stop fraudulent transactions, while maintaining a frictionless shopping experience.

    CA Risk Analytics Network (CA RAN) is a unique, e-commerce fraud risk evaluation solution that stops fraud instantly and helps banks cut card-not-present (CNP) fraud losses by 25% and increase fraud detection by 20% (1, 2).

    Please join this exclusive briefing to learn more about CA RAN and how it can help:
    • Tap into the largest network of global cardholders and transaction data, gathered by CA’s industry-leading CA Payment Security Suite
    • Stop fraud immediately with real-time learning and instant risk score updates, based on behavioral analytics
    • Boost top-line revenue, while improved fraud detection reduces potential losses for better bottom-line results

    1. CA data science simulation on 50 CA Payment Security Suite customers.
    2. Results dependent on issuer-defined operational thresholds over a single issuer mode.
  • Securing Privileged Access Across the Hybrid Enterprise
    Securing Privileged Access Across the Hybrid Enterprise Mike Annau, Senior Presales Consultant, CA Technologies Recorded: May 18 2017 48 mins
    Whether they are obtained maliciously or leveraged inappropriately by a valid user, exploited privileged user accounts are the common threat of most data breaches.

    Find out how CA Privileged Access Management (CA PAM) can provide the end-to-end control over privileged users, from the gateway to the server and from the database to the cloud – all from a single management console:

    •Protect against data breaches while improving access protecting administrative credentials and automating login across multiple target devices and platforms with secure single sign-on.
    •Reduce the impact of insider threats monitor, record and audit all activity with immediate playback.
    •Satisfy regulatory compliance and audit requirements with 360˚access controls across all environments including cloud, hybrid and NSX.

Embed in website or blog