Meeting the Ongoing Challenge of Identity and Access Compliance

Sumner Blount, Sr. Principal, CA Technologies Security Business Unit
As new regulations (HITECH) arise, and existing ones introduce more stringent requirements (HIPAA, PCI), compliance remains an ongoing challenge for many organizations. Because manual compliance controls introduce expense and increase risk, Identity and Access Management (IAM) provides an excellent foundation on which to implement automated controls for continuous compliance. This webcast will provide a maturity model for compliance controls, and highlight critical capabilities for identity-related compliance in enterprise and cloud environments.
Jun 19 2012
54 mins
Meeting the Ongoing Challenge of Identity and Access Compliance
Join us for this summit:
More from this community:

Cloud Computing

Webinars and videos

  • Live and recorded (3267)
  • Upcoming (98)
  • Date
  • Rating
  • Views
  • Join us for a 30-minute live session every Friday, where we’ll tour the RingCentral interface, discuss the latest innovations and features available on the RingCentral platform, and share best practices on leveraging cloud communications for your business. This session features a live demo of RingCentral Office and an open Q&A session led by a Sales Engineer. This week tune in and learn how your employees can hold multi-point HD video meetings around the world, anytime and anywhere with RingCentral Meetings.
  • 397% de ROI , c‘est ce que vous offre l’architecture Fluid Data de Dell. C’est prouvé mais comment est-ce possible ?
  • Rob Sherwood, CTO of Big Switch Networks, will present an end-to-end open source technology stack for SDN R&D, spanning switch hardware, software and SDN controllers. He will touch on the Open Compute Projects' switch design, Open Network Linux, Project Indigo, Project Floodlight and others. He will also discuss how these projects fit together, their various evolutionary paths, and how this stack fits in the landscape of emerging commercial and open source SDN products.
  • Join Mark Collier, COO of the OpenStack Foundation, Troy Toman, Cloud Architect at Rackspace and Das Kamhout, IT Principal Engineer at Intel, to discuss updates on Icehouse, the latest OpenStack software release, available on Thursday, April 17. OpenStack Icehouse is the ninth release of the open source software for building public, private, and hybrid clouds. Mark will also review the next OpenStack Summit agenda taking place in Atlanta, Georgia May 12-16, 2014 at the Georgia World Conference Center.

    This webinar will cover:
    - The latest features and trends from OpenStack Icehouse
    - Updated growth metrics from the OpenStack community
    - Opportunities to learn more at the OpenStack Summit in Atlanta May 12-16, 2014
  • Automation is a powerful tool. It strips time and cost out of processes, minimizes errors, and frees up skilled staff to focus on higher value activities. Most IT teams have already capitalized in some part on automation, and most IT professionals can see the potential in extending automation across the enterprise. But how do you embed automation in the company IT DNA? Where do you start in the journey from script automation towards enterprise-wide process automation?

    In this session you will learn how you can scale automation to an enterprise-level through the adoption of a Center of Excellence. Our proven approach creates a cohesive framework for automation and breaks through silos, so your organization benefits from economies of scale and the advantages that automation brings.
  • In today's multi-cloud world, do you find yourself thinking, "I really need an open source private cloud that is completely compatible with leading public clouds, i.e. AWS, GCE."

    This webinar explores the anatomy of an OpenStack-powered private cloud built with hybrid computing and DevOps in mind. Join Cloudscaling’s CEO Randy Bias and Scalr CEO Sebastian Stadil as they discuss the design considerations of a hybrid cloud environment that both IT and developers will love. Mark Williams, Redapt’s CTO (former VP of zCloud Infrastructure Operations) will also share real-world experience from implementing one of the first large-scale hybrid cloud infrastructures.

    Register today and gain insight into:
    - Building OpenStack-powered private clouds
    - Private and public cloud interoperability
    - Managing your hybrid cloud with an eye to the future
    - Lessons from the field; what works and what doesn't
  • In today's multi-cloud world, do you find yourself thinking, "I really need an open source private cloud that is completely compatible with leading public clouds, i.e. AWS, GCE."

    This webinar explores the anatomy of an OpenStack-powered private cloud built with hybrid computing and DevOps in mind. Join Cloudscaling’s CEO Randy Bias and Scalr CEO Sebastian Stadil as they discuss the design considerations of a hybrid cloud environment that both IT and developers will love. Mark Williams, Redapt’s CTO (former VP of zCloud Infrastructure Operations) will also share real-world experience from implementing one of the first large-scale hybrid cloud infrastructures.

    Register today and gain insight into:
    - Building OpenStack-powered private clouds
    - Private and public cloud interoperability
    - Managing your hybrid cloud with an eye to the future
    - Lessons from the field; what works and what doesn't
  • Join salesforce.com customer kCura as they describe the value of having a communities platform to create frictionless service experiences with law firms, government agencies, and litigation service providers. Learn how a self-service community experience enables customers to help each other and themselves, letting service teams focus on the big issues. All of these benefits ultimately translate into a frictionless and unified experience for all their customers!

    George Orr is the VP of Client Services for kCura. He leads strategic and implementation initiatives designed to enhance the online experience of customers.
  • Everyone knows that there are risks associated with moving enterprise data to a Cloud and everyone knows the huge potential that the analytics of Big Data can bring especially when using the Cloud, but what happens when these two converge.

    The presentation will discuss some of the security and privacy challenges associated with Big Data in the Cloud and will present a number of key initiatives that the ODCA have done to support enterprises that wish to take this step.
  • Tras crear un prototipo inicial de su aplicación para una vista previa limitada ya es hora de que el equipo pase a consolidar la arquitectura haciéndola más robusta y tolerante a los fallos antes de lanzarla oficialmente al público final.

    En este capítulo se tratan conceptos de la infraestructura de AWS tales como regiones y zonas de disponibilidad; además, se explica cómo utilizar tales características para incrementar la tolerancia de la aplicación a los fallos.

    Servicios y características tratados
    •Conceptos clave sobre infraestructura (regiones y zonas de disponibilidad)
    •Equilibro de carga elástico (Elastic Load Balancing)
    •Amazon RDS

    Demostración
    •Creación de una AMI basada en una instancia en ejecución
    •Creación y configuración de un equilibrador de carga elástico
    •Zonas de disponibilidad múltiples con Amazon RDS
    •Alarmas con Amazon CloudWatch
  • Channel
  • Channel profile
Up Down
  • Be Smarter than a Hacker. Intelligent Authentication Must be Strong & Risk-Based May 8 2014 4:00 pm UTC 60 mins
    In the past – and even now - IT departments have employed authentication methods that required end users only to provide a valid user ID and a password. Hackers have been successfully targeting user names and passwords as an entry point for malicious attacks for some time. To stay ahead of hackers, you need best practice Intelligent Authentication methods that include both strong and risk-based authentication.

    Please join Carole Gunst, Sr. Principal and Charley Chell, Sr. Director, Security Solutions from CA Technologies to learn which Intelligent Authentication methods are essential and what you can do to protect your organization with authentication methods that are both strong and risk-based.
  • Enabling and Securing Multi-Channel Customer Interactions Apr 24 2014 5:00 pm UTC 60 mins
    Today's organizations are moving more interactions online through web, mobile and API-enabled web services to empower their customers and increase revenue. Managing the high volume of customer identities and enabling secure interactions across a set of web, mobile and hybrid apps, from a variety of different devices can be challenging.
    On April 24th at 1pm ET, please join David Gormley, Director, Security Solutions for CA Technologies, to learn how you can securely accelerate the delivery of new applications and services, while improving the customer experience across multiple channels of interaction.
  • Single Sign-On is Critical to Business Objectives (Global Event) Recorded: Apr 16 2014 30 mins
    Dynamic forces such as cloud, mobile and social media are forcing IT leaders to change their approach to security. This raises an important question: how should you manage identity and access effectively while juggling business objectives of speed, cost effectiveness and positive customer experience?

    With identity as the new perimeter, single sign-on can be the foundation of both managing risk and reaping the benefits of these new business strategies.

    Please join Ken Ang, Security Solution Strategist for CA Technologies, to learn more about management of user identities throughout their lifecycle and access rights across multiple platforms, with a single, scalable and reliable solutions.
  • Identity Management: The Foundation of Secure Business Recorded: Mar 12 2014 45 mins
    Providing convenient user access to systems and applications, while managing risk and governing access, remains the key challenge that IT and Security need to overcome to support critical business functions. As the number of users multiplies and devices, systems and platforms grow increasingly diverse, sophisticated identity management capabilities such as automated provisioning and end-user self-service functions are required to support business growth in the emerging open enterprise.

    Please join us for this webcast, when Merritt Maxim, Director, and Bob Burgess, Advisor, Security Solutions from CA Technologies will discuss how identity management and governance solutions from CA Technologies can facilitate the common identity-related tasks such as provisioning, entitlements certification and access requests to enable secure business growth and a simplified user experience.
  • A Dream or Necessity? Achieving Unified Web and API Access (Global Event) Recorded: Mar 12 2014 48 mins
    The multi-channel organization is here and you can thank the Application Programming Interface (API). While the Web has served as the primary form of user engagement, the mobile channel has expanded how organizations reach consumers and employees, with the API acting as the fundamental connectivity point. As your organization rolls out multi-channel environments, can you avoid siloed management and security, or are there practical steps you can take to achieve unified access?

    Please join Cheng Jang Thye, Principal Business Tech Architect for CA Technologies, to discuss how unified access can be achieved by leveraging your existing web application management investment when deploying API security and management solutions. You will learn the opportunities APIs can provide to your business, the required components of an API solution, how CA Layer 7 API solutions integrate with CA SiteMinder web access solutions, and get an overview of the recently available policy integration with the release of CA Layer 7 API Gateway 8.0.
  • Identity Management and Governance for SAP Environments Recorded: Mar 5 2014 43 mins
    When requesting access to systems or applications, business users need to know the potential risks of such actions to enable compliance with internal business policies and government regulations. The cost for non-compliance can be high. As a result, organizations are seeking solutions that combine automated Segregation of Duties (SoD) risk analysis with robust capabilities for user provisioning and user management, to manage user access and prevent out-of-policy activities.

    Please join Bob Burgess, Solution Strategy Advisor at CA Technologies, and James Rice, Director of Customer Solutions at Greenlight Technologies, to learn how you can obtain better visibility into your SAP/GRC environments and manage the risk of over-privileged users and SoD violations.
  • The Threat of Session Hijacking and How You Can Prevent It Recorded: Feb 19 2014 41 mins
    Session Hijacking is a serious security threat where the cookie used to authenticate a user to a remote server is stolen and then used by an attacker to assume the victim’s identity and take over their session. Since the user session appears to be valid, it is difficult to detect once the hijacking has occurred, so pre-emptive steps need to be taken upfront.

    Please join Chris Wraight, Director, Security Solutions and Aaron Berman, Security Solutions Advisor at CA Technologies to learn why this security gap exists and explore solutions to assist in preventing such attacks.
  • Security Update: 2013 Takeaways and Predictions for 2014 (Global Event) Recorded: Feb 18 2014 59 mins
    Opening up the enterprise to enable new, revenue generating ways of engaging employees, partners, and customers, while still protecting the business, intellectual property and customer privacy continues to present new opportunities and challenges for security professionals.

    As 2014 starts out, it’s time to review which important trends have emerged or shifted in the last year, what we learnt from them and also predict what we expect will happen in the world of identity and cyber-security in the next 12 months.

    Our takeaways and predictions are based on gathering thoughts and ideas from many customers, practitioners and industry experts, and synthesizing it down to a key set of insights that provide a clear and practical guide for your enterprise security strategy and roadmap.

    Please join Reuben Koh, Director, Security Strategy for CA Technologies, for a thought provoking, actionable discussion on where we’ve come and where we are heading.
  • Security Series Part 6: Unleashing the Power of Big Data through Secure APIs Recorded: Feb 13 2014 62 mins
    Quite often what makes an organization unique can be found in the volumes of data it has stored and hidden from the outside world. But while access is prevented and data is protected, new revenue streams are prohibited. Please join us to learn how securely externalizing your core Big Data assets through a Secure API Data Lens can result in new business models and revenue streams never attainable until now.
  • It’s Okay to be a Control Freak! (Over Privileged Identities) Recorded: Feb 11 2014 58 mins
    When it comes to managing privileged identities, it’s ok to be a “control freak” in order to prevent harmful results such as data loss and destruction, malicious damage, fines, and lawsuits. Auditors are also requiring that their clients proactively demonstrate the ability to control privileged users and report on their activities. Managing passwords for privileged accounts is a starting point, but there is more you can do to help secure your IT environment.

    In this webcast, join Russell Miller, Director, Security Solutions and Steven McCullar, Advisor, Solution Strategy, Security Solutions for CA Technologies, to learn how you can help ensure that your environments are protected by implementing least privilege access and fine-grained access controls.
  • SaaS Versus On-Premise…Deployment Reality Recorded: Feb 5 2014 39 mins
    Webinar 2 builds upon the information presented in the Webinar 1: SaaS Versus On-Premise…What Are My Options? In Webinar 2, we take a deeper dive into the decision making process that leads to the right model for your enterprise systems or utility services.

    Some of the issues that need analysis when making a cloud/no-cloud decision include analysis of the costs, understanding the use cases, looking at security and governance, and the value of time-to-market and agility. The idea is to weigh the positives and the negatives, understand the core metrics, and then make a decision based upon the best available information.

    We’ll explore how to understand the deployment realities when considering an on-premises versus SaaS solution. We’ll suggest a decision model and step-by-step process to define the core metrics for the decision, and provide some helpful experiences from the trenches from those who have made these critical calls in the last several years.

    Topics covered include:

    •Step 1: Comparing Costs
    •Step 2: Understanding Use Cases
    •Step 3: Considering Security and Governance
    •Step 4: Considering Time-to-Market and Agility
    •Step 5: Pulling the Trigger
    •Step 6: Considering Operations
  • Your APIs Are Exposed: Avoiding the Top 5 API Security Vulnerabilities Recorded: Jan 29 2014 54 mins
    APIs are quickly becoming the hacker’s new favorite attack vector. Why wouldn’t they? They offer a direct path to critical information and business services that can be easily stolen or disrupted. But there’s a new wrinkle. As demonstrated during the widely publicized Snapchat data breach, a private API can be exploited just as easily as a public API. So what measures can you take to strengthen your security position?

    In this webcast, Francois Lascelles, Chief Architect, CA Technologies Layer 7, will discuss recent high profile API data breaches, the top 5 API security vulnerabilities that are most impactful to today’s enterprise, and the protective measures that need to be taken to mitigate API and business exposure.
  • SaaS Versus On-Premise…What Are My Options? Recorded: Jan 23 2014 44 mins
    The growth of cloud computing is due largely to the growth of software-as-a-service (SaaS). The SaaS consumption model, in many cases, provides more agility and cost efficiencies than traditional methods of consuming software. While SaaS is indeed a consideration, there are instances where it’s just not a fit. Recognizing when to go SaaS and when to stay on-premise is a problem that enterprises will wrestle with now and into the future, as cloud computing continues to gather momentum.

    The truth is that the SaaS model is not always a good fit, and neither are traditional approaches to software deployment and operations. You have to consider many options, requirements, and technologies to understand what’s right for your specific needs.

    In this Webinar, we’ll take the mystery out of how to select SaaS-delivered solutions or traditional on-premise approaches. We’ll explore the requirements to consider, and the types of technologies available.

    Topic covered, include:

    •Defining the options, including SaaS and on-premise
    •Understanding the technology options
    •Understanding the cost advantages
    •Understanding fit-for-purpose
    •Charting a path to the right decision
  • The New Age of Identity: Survival of the Federated Recorded: Jan 22 2014 59 mins
    As the ability to adapt to new trends such as social identity, SaaS and mobile users becomes a competitive differentiator, many organizations are leveraging identity federation to both support new customer engagement and control the sharing of information externally. In this webcast, featured Gartner analyst Mary Ruddy will discuss five key patterns that are driving current trends in identity federation, the effect of those patterns on broader identity and access management (IAM) architecture, and how organizations should be adapting to these changes. In this session, you will learn how to identify which situations would benefit most from identity federation, how to determine the appropriate authentication level and the role that federation standards such as OAuth and OpenID Connect play in your identity federation deployment.

    Merritt Maxim, Director, Security Solutions for CA Technologies will also provide key insight on how identity federation can help securely enable your business in the new ‘open’ economy and what you can do to control shared information while maintaining availability and accessibility.
  • Security Series Part 5: Key Takeaways from 2013 & Predictions for 2014 Recorded: Jan 16 2014 59 mins
    Opening up the enterprise to enable new, revenue generating ways of engaging employees, partners, and customers, while still protecting the business and privacy continues to present new opportunities and evolve in the marketplace. As 2014 starts out, it’s time to review which important trends have emerged or shifted in the last year, and predict what we expect will happen in the world of identity and cyber-security in the coming year. Our takeaways and predictions are based on gathering thoughts and ideas from many practitioners and industry experts, and synthesizing it down to a key set of insights that provide a clear understanding of where the world of identity and security is going. Please join us for a thought provoking, actionable discussion on where we’ve come and where we are heading in the identity marketplace.
  • Security Series Part 4: The Economics of Digital Identity Recorded: Dec 19 2013 61 mins
    Digital identities help solve a crucial problem in today’s highly interconnected IT world-namely knowing the identity of the individual interacting with you. Unfortunately, there are no ways to perfectly determine the identity of a person or thing in cyberspace. Even though there are numerous attributes associated to a person’s identity, these attributes or even identities can be changed, masked or dumped. This session will look at how organizations can leverage these existing digital identities in a manner that does not increase risk or impede user productivity and satisfaction and also share some recent research from the Ponemon Institute on this topic.
  • Your APIs Are Passing Sensitive Data. Are You Compliant? Recorded: Dec 12 2013 61 mins
    The API economy has arrived and business models are being reshaped to take advantage of the financial opportunities that application development has to offer. However, the data exposed through externally facing Application Programming Interfaces (APIs) can often be sensitive or highly regulated. This can put your company at risk of data compromise or non-compliance.

    Please join Nimrod Vax, VP, Security Solutions and Dana Crane, Sr. Principal, Security Solutions, CA Technologies, to learn about the business opportunities that APIs can deliver, and what you can do to reduce the risk of compromising data, while ultimately maintaining compliance.
  • Strong Authentication is Taking A Risky Turn - Are You Prepared? Recorded: Dec 11 2013 60 mins
    As online threats grow increasingly sophisticated and password weaknesses continue to be exposed, strong authentication has become more popular. Many organizations struggling to balance better protection with user convenience are turning to risk-based authentication. This allows them to evaluate contextual factors such as device identification, geolocation and IP address to determine risk levels, without impacting the experience of legitimate users.

    Please join guest speaker Andras Cser, VP and Principal Analyst at Forrester Research, Inc., and David Gormley, Director, Security Solutions at CA Technologies to learn about the trends and best practices for layered authentication methods and how you can implement a risk-based layer of protection against identity theft, data breaches and fraud.
  • Achieve Unified Web & API Access with CA SiteMinder® & CA Layer 7 Recorded: Dec 4 2013 51 mins
    The multi-channel organization is here and you can thank the Application Programming Interface (API). While the Web has served as the primary form of user engagement, the mobile channel has expanded how organizations reach consumers and employees, with the API acting as the fundamental connectivity point. As your organizations rolls out multi-channel environments, can you avoid siloed management and security, or are there practical steps you can take to achieve unified access?

    Please join Ben Urbanski, Sr. Solution Architect from CA Layer 7 Technologies and Herb Mehlhorn, Advisor Product Management for CA SiteMinder, discuss how unified access can be achieved by leveraging your existing web application management investment when deploying API security and management solutions. You will understand the opportunities APIs can provide to your business, the required components of an API solution, how CA Layer 7 API solutions integrate with CA SiteMinder web access solutions; and get an overview of the recently available policy integration with the release of CA Layer 7 API Gateway 8.0.
  • Security Series Part 3: Accelerate Mobile App Delivery: API Security for DevOps Recorded: Nov 21 2013 61 mins
    The relationship between Development and Operations continues to become more intertwined as cloud and mobile service expectations rise. Faster application release cycles and improved quality equates to improved operational performance and customer satisfaction. But how can good API Security & Management practices help to accelerate the delivery of mobile apps? And what’s the most effective way to secure them? Please join us to discuss API Security & Management practices to improve your DevOps application delivery process.
Educational webcasts for the IT Security Professional
The CA Technologies IT Security solutions help CSOs and security professionals move the business forward by facilitating growth, innovation and collaboration, and driving IT operational excellence, all while managing risk and compliance. CA Technologies will show you how businesses can gain the control they need over physical, virtual, and cloud IT environments—so they can protect the business and the information on which it relies.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Meeting the Ongoing Challenge of Identity and Access Compliance
  • Live at: Jun 19 2012 5:00 pm
  • Presented by: Sumner Blount, Sr. Principal, CA Technologies Security Business Unit
  • From:
Your email has been sent.
or close
You must be logged in to email this