Meeting the Ongoing Challenge of Identity and Access Compliance

Sumner Blount, Sr. Principal, CA Technologies Security Business Unit
As new regulations (HITECH) arise, and existing ones introduce more stringent requirements (HIPAA, PCI), compliance remains an ongoing challenge for many organizations. Because manual compliance controls introduce expense and increase risk, Identity and Access Management (IAM) provides an excellent foundation on which to implement automated controls for continuous compliance. This webcast will provide a maturity model for compliance controls, and highlight critical capabilities for identity-related compliance in enterprise and cloud environments.
Jun 19 2012
54 mins
Meeting the Ongoing Challenge of Identity and Access Compliance
More from this community:

Cloud Computing

  • Live and recorded (4189)
  • Upcoming (134)
  • Date
  • Rating
  • Views
  • Join Tom Kellermann, Chief Cyber Security Officer for Trend Micro, in an informative webinar specifically tailored for corporate executives and directors who are ready to take the reins of a real and effective plan to secure their organization, their data, and their careers against targeted attacks.

    During this live webinar, you’ll learn:
    • How to identify, classify, and protect your valuable data assets
    • How to assess your organization’s vulnerability to attack
    • How to measure and mitigate cyber risks cost-effectively
  • Good data is the key to innovation, solid research collaboration, and, ultimately, the creation of life-saving drugs and treatments.

    But does your IT strategy reflect this? All too often, data is compromised and constrained by the needs of your enterprise’s applications. Join our webinar to discover a new data-centric approach to IT that's radically changing the biggest names in life sciences.

    By moving to a data-centric model, your organization will be better poised to:

    •Integrate data regardless of source, volume, and variation
    •Quickly and easily change out applications
    •Uncover unique insights

    Gary Palgon, CISSP and VP, Healthcare and Life Sciences at Liaison, will demonstrate how to apply this innovative data-centric approach in a life sciences environment.
  • Cutting down on the time taken to complete complex document review cycles allows the modern lawyer to operate at the pace required by their industry.

    Join our webinar to learn top tips for shortening these review cycles without losing document integrity and risking corruption. We’ll also cover what technologies are available to provide a quick and accurate way to improve document review efficiency.
  • Agility, Mobility, Innovation, Time-to-Market. Are these words that describe your ideal business application environment? Now, you can leverage the Salesforce1 Platform to rationalize your business applications. Join this webinar to:

    -Learn how to improve application efficiencies while reducing operating costs.
    -Hear a successful case study where a global Energy Company leveraged the Salesforce1 platform to reduce the number of applications used by one of its business units by 70% in just 4 months.
    -Explore how this cross industry solution can help you rationalize your IT business application landscape.

    Speakers:

    Matthew Sheppard, Sr. Manager, Accenture
    Matt Pitner, AVP, Oil & Gas, Salesforce

    Who Should Attend:

    -IT leaders interested in IT landscape rationalization and IT cost reduction
    -Business leaders looking for improved efficiencies, agility, and mobility for their business applications
  • A lot has changed in the way we communicate for business. A decade ago, most organizations had employees who came to the office every day, used desktop computers and desk phones, and stopped communicating for work when they went home.

    Today, people communicate for work anywhere, anytime, and on any device. Per Forrester, sixty-six percent of employees use two or more mobile devices for work. And according to Frost & Sullivan, nearly 25 percent of employees work from home or the road. What’s more, the desk phone is not the only business device. Based on a RingCentral survey, 35 percent of employees are using their mobile phones for work even when they are in the office. And nearly 80 percent of employees text for business, with 32 percent reporting that they’ve even closed a business deal via text.

    Even with these undeniable business behavior changes, the vast majority of companies haven’t optimized their communications infrastructure for mobile workforces or BYOD.

    Join this webinar to get ahead of the pack and learn the benefits of a cloud communications solution that supports the new world of work.

    •Understand the trends driving mobility and behavior changes in the work place, with Melanie Turek, VP of Research for Enterprise Communication & Collaboration, Frost & Sullivan.
    •Get the real story from a business that has addressed their mobility needs first hand from Adam Fishman, director of growth and operations for Lyft, a community ride-sharing service.
    •Hear how a cloud communications solution is addressing several challenges businesses face in the new work world from Nisha Ahluwalia, VP of product marketing at RingCentral.
  • We all want our families and homes to be safe with the convenience of remote monitoring, but do these smart home security devices really make our families safer or put them at more risk by inviting easier access to our homes electronically via insecure Internet of Things? In a follow-up to HP’s 2014 report on the Internet of (Insecure) Things we explore the security of popular off-the-shelf connected Home Security Systems and discuss various testing techniques we used in our study along with recommendations for manufacturers, developers and consumers.
  • Mobile is changing the way we work in the enterprise. Today’s workforce is demanding the ability to access and share business files from any device. In this webinar learn why Fortune 5000 companies select Syncplicity to achieve the promise of mobile productivity and solve the “Dropbox” problem.
  • From unobtrusive advanced malware detection technologies to automated threat response and actionable mobile-friendly dashboard – manage security from any device, any time, ESET will present new solutions for securing your endpoints and new ways to manage them.
  • Looking for a simple way to achieve cost-effective z Systems for storage? Join CA Technologies and Microsoft for an interactive discussion, moderated by Joe Clabby, President, Clabby Analytics, on the evolving role of cloud innovation and z Systems in today’s new application economy to help IT derive real business value through operational and cost efficiencies.

    Your tape and disk systems are like trusty friends – and you have relied on these dependable storage media to backup, restore, archive and recover z Systems data. And with your organizations’ digital information growing from gigabytes to petabytes seemingly overnight, what options are available to datacenters when technology leapfrogs in a seemingly regular cadence? Buy more hardware?

    Don’t be forever caught in “catch up” mode when it comes to your storage infrastructure. Attend this webcast and discover how CA Cloud Storage for System z, featuring Microsoft Azure, simplifies the process of storing mainframe data in the cloud and help lower data center storage costs to pennies per GB. Hear compelling ROI cases how re-envisioning your existing storage methodologies can help you store more and spend less – yes, it’s possible!
  • The game has changed. Due to cost savings, and the privacy and mobility needs of employees, in just a few short years companies have loosened the mobile device leash. Enterprises are now shifting from traditional “company owned” devices, to allowing “Bring Your Own Device” in the workplace. According to Gartner, by 2017 fifty percent of companies will actually force employee to bring their own device to work.

    But if you’re tasked with securing devices, how do you accommodate BYOD? Where do you start and what kinds of security solutions should you be looking for?

    In this webinar, Chris Hines, Product Manager at Bitglass will teach you how to balance the needs of IT admins and employees when it comes to securing your mobile world.
  • Channel
  • Channel profile
  • Briefings Part 6: Identity Management and APIs – The Evolution Continues Recorded: Feb 12 2015 59 mins
    The Identity Management market has been buffeted over the past two years by several important trends – cloud, mobile, social media, and increased app velocity, among others. These trends have dramatically shaped the identity landscape, and changed the security strategy and tactics that many companies have adopted. But, these changes are not finished. In this webcast, we'll look at the next phase of identity management and APIs, and how the continuing trend towards cloud services and the explosion of mobility and applications will continue to shape the role of Security. We will also offer best practice guidelines for dealing with these continuing changes.
  • Cyber-Defense: Are you Toast? Recorded: Feb 5 2015 34 mins
    Attackers continue to expose vulnerabilities at the world’s most recognized organizations. They are more skilled, more dedicated and supported by more resources than ever. While no one wants to be the “next one”, the key lies in understanding that privileged identities are at the heart of every highly-damaging breach.

    Please join Russell Miller, Director, Security Solutions and Steven McCullar, Advisor, Solution Strategy for CA Technologies to learn how protecting privileged identities can help bring the best security controls to the chokepoint of a potential attack. With the right controls in the right places, you can be well positioned to be in the headlines for only the right reasons.
  • Customer-focused Identity Management: Improve Relationships and Security Recorded: Jan 29 2015 61 mins
    In the application economy, increasing demand from customers to engage with modern businesses online, through social media and via mobile applications, has generated new requirements for customer-focused Identity and Access Management (IAM).

    Join us on January 29, 2015 at 11am EST, when Andrew Kellett, Principal Analyst at Ovum, will offer practical guidance for aligning your IAM strategy to support both user experience and security controls, which evolve throughout the customer lifecycle. He will explore the unique challenges of customer-focused IAM and how it can be leveraged to improve customer relationships. Sumner Blount, Director, Security Solutions for CA Technologies, will join the discussion to illustrate key technologies that can support effective and secure customer-focused IAM deployments.
  • Turning the Confusing Identity Management Landscape into a Strategic Plan Recorded: Jan 22 2015 46 mins
    In the Application Economy, factors such as mobility, cloud, social media and the Internet of Things demand new ways of managing identities and access across your increasingly mobile users.

    On January 22, 2015 at 11am EST, guest speaker Andras Cser, VP and Principal Analyst at Forrester Research, Inc., will explore how these factors are changing the identity and access management (IAM) landscape and discuss the impact of Customer IAM. He will highlight specific predictions for how identity-based security will evolve in the coming year and offer specific guidance for how to improve your customer engagement and plan a successful security strategy. Sumner Blount, Director, Security Solutions for CA Technologies, will join the discussion to provide further insight and practical guidance.
  • Briefings Part 5: The Business of Identities – Predictions for 2015 Recorded: Jan 15 2015 61 mins
    Last year, experts at CA Technologies offered a set of predictions about interesting trends in the identity market and its related technology areas. In this webcast, we will review those predictions and rate ourselves on how we did. But, more importantly we will fearlessly offer predictions about what will be happening in the world of identities during 2015, and offer specific guidance into what organizations can be doing now to prepare for these changes.
  • Briefings Part 4: Your Business is Exposed: Avoiding API Security Vulnerabilites Recorded: Dec 18 2014 58 mins
    APIs are quickly becoming the hacker's new favorite attack vector. Why wouldn't they? They offer a direct path to critical information and business services that can be easily stolen or disrupted. And your private APIs can be exploited just as easily as a public API. So what measures can you take to strengthen your security position? During this webcast, Francois Lascelles, Chief Architect, CA Technologies, will discuss recent API data breaches, the top 5 API security vulnerabilities that are most impactful to today's enterprise, and the protective measures that need to be taken to mitigate API and business exposure.
  • Want to Avoid Security Breaches? Leveraging the NIST Framework for Cybersecurity Recorded: Dec 4 2014 62 mins
    Is your organization worried about joining the ranks of other companies that have suffered breaches recently? Are you concerned whether your cybersecurity procedures and technologies will protect you from similar insider threats and external attacks?
    The NIST Framework for Improving Cybersecurity defines guidelines and best practices for improving cybersecurity across several major areas. But, how do you take this complex framework and use it in your own environment, and what technologies can help you with adherence to it?
    In this webcast, Sumner Blount and Jamie Brown from CA Technologies will explore the Framework to help you develop a plan for improving cybersecurity in your own environment. We will focus on the Protect function because of its critical importance for protecting assets from improper access and use. Join us to learn how you can leverage identity management and the NIST guidelines to help your organization avoid the impact of a public breach.
  • Briefings Part 3: End-to-End Mobile Security, Samsung Knox and CA Technologies Recorded: Nov 20 2014 57 mins
    As the largest Android device manufacturer Samsung understands the value as well as the security implications that apps have introduced. While businesses are reshaping delivery models to capitalize on its opportunities, security risks are forcing organizations to think differently. Controlling access to the app is no longer sufficient. Instead, businesses have to take an end-to-end security approach – protecting access from the app to the backend API. Please attend this webinar to hear Leif Bildoy, Product Manager at CA Technologies, discuss how Samsung has increased the security within its KNOX Workspace to deliver end-to-end security while maintaining the ever important user experience.
  • Briefings Part 2: Are You Prepared For the Next Attack? Recorded: Oct 23 2014 57 mins
    Today, usernames and passwords continue to be stolen and exploited in record numbers. Hackers are still stealing credentials and accessing sensitive data. To stay ahead of hackers, you need to combine the appropriate forms of authentication and application access/session management to reduce risk and to prevent security breaches before they happen. Please join CA Technologies to learn about risk appropriate authentication and SSO/access management capabilities that can help protect your organization from hackers and their popular attack vectors.
  • Briefings Part 1: Unleashing The Power of Consumer Identity Recorded: Sep 25 2014 62 mins
    How can today’s enterprises position themselves to best leverage large consumer populations in ways that meet the business’ requirements without overwhelming the IT organization? In this webinar, Merritt Maxim, Director, Security Solutions for CA Technologies, will discuss the key requirements to deliver consumer scale identity management and examine how capabilities such as user management, social login and risk-based authentication can help organizations realize the full value of consumer identities, while providing a simple user experience and one which helps keep risks in check.
  • Cloud IAM for Seamless Access to SaaS and On-Premise Apps Recorded: Sep 18 2014 59 mins
    In the application economy, it is critical to simplify access to applications delivered from the enterprise and cloud – and do so quickly, securely and cost effectively. Cloud IAM, or Identity and Access Management as a Service (IAMaaS), can be deployed with or without on-premise IAM products to provide seamless access for your employees, partners and customers.

    Join David Gormley, Director, Security Solutions at CA Technologies, to learn how Cloud IAM can be easily integrated with existing IAM components to provide additional flexibility and scalability without burdening your IT infrastructure.
  • Privileged Identities: The Choke Point for Advanced Attacks Recorded: Sep 11 2014 63 mins
    The most damaging attacks, whether from inside or outside the organization, have one thing in common: the use of privileged identities. Attackers use authorized or compromised privileged identities to gain access to information, attack new systems, and hide their tracks. Restricting access to compromised accounts is simply not enough. To mitigate damage from these attacks, a combination of capabilities, including fine-grained controls and governance is needed.
    Join Russell Miller, Director, Security Solutions at CA Technologies to learn how with the right blend of processes and controls on privileged accounts, you can create a comprehensive and cohesive approach to securing your organization where it matters most.
  • BYOID: New Ponemon Institute Study on Key Digital Identity Trends (APJ Event) Recorded: Sep 11 2014 48 mins
    While Bring Your Own Identity (BYOID) can deliver tangible benefits to end users and relying parties, these benefits are accompanied with potential risks and liability concerns. CA Technologies and the Ponemon Institute recently conducted a worldwide survey of over 2,500 IT users and business users to understand the value, benefits and concerns that organizations have around using BYOID.

    Please join Merritt Maxim, Director, Security Solutions for CA Technologies who will review the key findings from the survey, deliver insight into the current state of BYOID and provide guidance on how organizations can overcome these barriers to gain the maximum value from BYOID without unnecessarily increasing risk or fraud
  • Retail Security: Don’t Be the Next Breach Headline Recorded: Aug 21 2014 33 mins
    2013 has been called “The Year of the Retail Breach.” Many organizations are struggling to maintain a comprehensive defense strategy while supporting customers with an engaging experience through mobile devices and social platforms. Retailers in particular have become increasingly aware of their vulnerability and are now searching for comprehensive approaches to security in 2014.

    Please join Russell Miller, Director, Security Solutions and Michael Dullea, Sr. Principal, at CA Technologies, to understand common attack scenarios and learn how you can help protect critical systems, from Points-of-Sale (POS) to back-end infrastructure and supporting systems.
  • BYOID: New Ponemon Institute Study on Key Digital Identity Trends Recorded: Aug 7 2014 56 mins
    While Bring Your Own Identity (BYOID) can deliver tangible benefits to end users and relying parties, these benefits are accompanied with potential risks and liability concerns. CA Technologies and The Ponemon Institute recently conducted a worldwide survey of over 3,000 IT users and business users to understand the value, benefits and concerns that organizations have around using BYOID.

    Please join Larry Ponemon, Chairman and Founder of the Ponemon Institute and Merritt Maxim, Director, Security Solutions for CA Technologies for a review of the key findings from the survey, insight into the current state of BYOID and guidance on how organizations can overcome these barriers to gain the maximum value from BYOID without unnecessarily increasing risk or fraud.
  • Enabling and Securing Multi-Channel Customer Interactions (Global Event) Recorded: Jul 30 2014 59 mins
    Today's organizations are moving more interactions online through web, mobile and API-enabled web services to empower their customers and increase revenue. Managing the high volume of customers identities and enabling secure interactions across a set of web, mobile and hybrid apps, from a variety of different devices can be challenging.

    Please join David Gormley, Director, Security Solutions for CA Technologies, to learn how you can securely accelerate the delivery of new applications and services, while improving the customer experience across multiple channels of interactions.
  • Leveraging the NIST Framework to Improve Cybersecurity Recorded: Jul 24 2014 47 mins
    In February 2014, the National Institute of Standards and Technology (NIST) officially approved and released its Framework for Improving Critical Infrastructure Cybersecurity providing comprehensive guidance to help improve cybersecurity across a range of categories. It has since received significant attention from many organizations and verticals that are seeking best practices for strengthening security controls.

    Please join Sumner Blount, Sr. Principal, Security Solutions and Jamie Brown, Director, Government Relations for CA Technologies to explore the Framework’s goals and recommendations, and discuss key identity management technologies that can help improve your security strategy.
  • Critical Considerations for Securely Mobilizing Your Workforce–Any App, Anytime Recorded: Jul 15 2014 44 mins
    Enabling your mobile workforce is not a one-time effort but a journey. Various mobility considerations will undoubtedly come into play requiring IT to make decisions around what enterprise mobile apps to roll out to various employees and with what kind of access policies. Do you need to deliver mobile device access to existing web applications? Do you need to develop new native mobile apps – for your employees or your customers? And then what’s the best way to manage and secure these mobile apps? Please join Arun Bhattacharya and Tyson Whitten from CA Technologies as they provide customer validated recipes for securely enabling your mobile workforce, while covering everyday use cases for mobile app development, management and security.
  • IAM in the “Age of the Customer”: Balancing Usability and Security Recorded: Jul 10 2014 62 mins
    An increasing portion of your revenue and customer engagement hinges on digital relationships that span multiple channels like web and mobile, and this puts your customers in the driver’s seat more than ever before. Any hitch in securely registering or logging into your website, mobile app, or web services and undue friction when conducting transactions can send prospects and even loyal customers to your competition.

    Please join guest speaker Andras Cser, VP and Principal Analyst at Forrester Research, Inc. and John Hawley, VP of Security Strategy at CA Technologies, to explore the requirements for consistent security across channels of customer interaction and the need to create a new balance between convenience and security. Learn how Customer IAM (CIAM) can both enable and protect digital interactions so you can enhance customer relationships and reduce risk at the same time.
  • Business Hero: Identity Management at Consumer Scale Recorded: Jun 26 2014 47 mins
    Once upon a time, traditional commercial and home-grown Identity Management solutions were sufficient to support the identity and user access requirements of many organizations. Then along came the Internet and its sidekick Mobility to make it easier than ever for consumers, partners and employees to interact with your organization, meaning potentially millions of identities that need to be registered and managed. To the rescue comes a modern identity management solution that can scale to a growing volume of users and is both easy to use and administer.

    On June 26th, please join Merritt Maxim and Bob Burgess, from CA Technologies to learn how the story of identity management has evolved and the latest identity management and governance solutions to help your consumers, business users and administrators live happily, and securely ever after.
Educational webcasts for the IT Security Professional
The CA Technologies IT Security solutions help CSOs and security professionals move the business forward by facilitating growth, innovation and collaboration, and driving IT operational excellence, all while managing risk and compliance. CA Technologies will show you how businesses can gain the control they need over physical, virtual, and cloud IT environments—so they can protect the business and the information on which it relies.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Meeting the Ongoing Challenge of Identity and Access Compliance
  • Live at: Jun 19 2012 5:00 pm
  • Presented by: Sumner Blount, Sr. Principal, CA Technologies Security Business Unit
  • From:
Your email has been sent.
or close
You must be logged in to email this