Meeting the Ongoing Challenge of Identity and Access Compliance

Manage webcast
Sumner Blount, Sr. Principal, CA Technologies Security Business Unit
As new regulations (HITECH) arise, and existing ones introduce more stringent requirements (HIPAA, PCI), compliance remains an ongoing challenge for many organizations. Because manual compliance controls introduce expense and increase risk, Identity and Access Management (IAM) provides an excellent foundation on which to implement automated controls for continuous compliance. This webcast will provide a maturity model for compliance controls, and highlight critical capabilities for identity-related compliance in enterprise and cloud environments.
Jun 19 2012
54 mins
Meeting the Ongoing Challenge of Identity and Access Compliance
More from this community:

Data Center Management

  • Live and recorded (3407)
  • Upcoming (77)
  • Date
  • Rating
  • Views
  • The critical applications and services your end-users rely on every day can be deployed on-premise, hosted in the cloud, or even SaaS applications provided by a 3rd party that never cross your infrastructure. Your users don’t care where the app is running; they just need it to be available…and fast. And when there is a problem, they expect IT to resolve it!

    Join us on this webinar and see how to get visibility to all your applications so you can quickly and proactively identify where the problem is and resolve it quickly. Then, it really won’t matter where the applications are deployed!

    And the best news is that you can combine this application visibility with analysis from your OptiView XG. During the webinar you will learn:

    •The challenges of today’s Borderless Enterprise (aka – the network is outside of your 4 walls!)
    •How to monitor all your applications
    •How to use this visibility to extend your OptiView XG

    BONUS: There is a Special Promotion for OptiView XG owners!
  • This year’s Storage Developer Conference (SDC) is expected to draw over 400 storage developers and professionals. Get a sneak preview of key cloud topics that will be covered at SDC in this live Webcast where an expert panel will discuss:

    · Mobile and Secure - Cloud Encrypted Objects using CDMI
    · Object Drives: A new Architectural Partitioning
    · Unistore: A Unified Storage Architecture for Cloud Computing
    · Using CDMI to Manage Swift, S3, and Ceph Object Repositories

    You’ll learn how encrypted objects can be stored, retrieved, and transferred between clouds, how Object Drives allow storage to scale up and down by single drive increments, end-user and vendor use cases of the Cloud Data Management Interface (CDMI), and we’ll introduce Unistore - an innovative unified storage architecture that efficiently integrates heterogeneous HDD and SCM devices for Cloud storage systems.
    This Webcast is live so please bring your questions for our esteemed panel of experts.
  • Anuta NCX is a leading Network Services Orchestration solution (MANO) provider for NFV. In this webinar, Anuta CTO Srini Beereddy will share details about world-wide Service Provider customer deployments and NCX product architecture. The demonstrations include NFV use-cases such as Virtual CPE, Virtual MPLS backbone and Virtual Data Center using OpenStack as Virtual Infrastructure Manager (VIM). The demonstrations include multi-vendor VNFs such as Brocade Vyatta 5600 vRouter (with Intel DPDK support), Cisco CSR1000v router, F5 LTM VE, Juniper vSRX and Riverbed Virtual Steelhead. In addition, Srini will share how NCX orchestrates hybrid networks consisting of legacy PNFs and VNFs to further accelerate NFV adoption.
  • This webinar is for business leaders who wish to understand vulnerabilities in commercial software and how they can impact organizations:
    Software vulnerabilities remain one of the most common attack vectors for security incidents and data breaches, either as the entry point for hackers or as the enabler of privileges escalation inside networks.
    This webinar demystifies software vulnerabilities, shows how they relate to the wider ecosystem and demonstrates how this knowledge can be used to define strategies and improve security.
    Key takeaways:
    -What is a software vulnerability
    -How a software vulnerability becomes a threat
    -A glimpse of how threats multiply
    -How closing vulnerabilities impacts risk reduction
  • In today’s global market place your organization needs network connectivity with external entities – suppliers, credit card processing companies, business partners, data feeds etc. But are you really sure these connections are secure and compliant? Are you really sure they are not inadvertently creating holes in your network and exposing your organization to cyber criminals? The Target breach – and many others like it – should at least make you double check your practices.

    Presented by the renowned industry expert Professor Avishai Wool, this technical webinar will cover best practices for managing external connectivity lifecycle to and from your network, including:

    • Defining the right infrastructure, network segmentation, security controls and additional security protections
    • Managing changes to connectivity for third party applications or data feeds
    • Routing partner traffic through your network
    • Auditing and compliance challenges for both you and your partner
    • Technical considerations for managing the business and ownership aspects of third party connectivity
  • Watch this EMC Tech Talk for a live discussion about how you can automate provisioning of the underlying physical infrastructure on VCE Vblock Systems with ViPR Controller. Delays in rolling out a new business service can negatively impact your ability to generate new revenue.

    Integrate with VMware plug-ins and packs to create your own “as-a-service” offering. Easily and quickly respond to dynamic business needs with infrastructure lifecycle management.
  • Flash storage has the power to transform the way we do business, enabling organizations to accelerate IT, deliver a richer user experience, and gain real-time insights into their operations. But until now flash storage solutions have forced you to compromise on price, performance, or features. Some are super fast, but that speed comes with a steep price tag. Others are economical, but they lack enterprise-grade capabilities.

    Join Chris Tsilipounidakis as he discusses the latest advancements in flash technology and how Tegile is disrupting the industry by engineering intelligent flash arrays that deliver high performance and enterprise capabilities at one-third the cost traditional arrays. Learn how you can accelerate your business, maximize uptime, and achieve IT efficiencies with Tegile flash storage.
  • On June 2, 2015 at HP Discover Las Vegas, HP announced a new testing solution called Lean Functional Testing (LeanFT). LeanFT was built specifically for continuous testing and continuous integration.

    Join Amir Banet, Product Manager for LeanFT and Joe Colantonio, Test Automation Guru and host of the popular TestTalks podcast to see a product demo and learn more about:

    LeanFT and its core features
    How LeanFT facilitates continuous testing in Agile and DevOps
    The difference between Unified Functional Testing (UFT) and LeanFT
  • The first installment of our performance benchmarking Webcast series, “Storage Performance Benchmarking: Introduction and Fundamentals” aims to bring anyone untrained in the storage performance arts to a common base with the experts. In this first webcast, gain an understanding of the complexities of benchmarking modern storage arrays and learn the terminology foundations necessary for the rest of the series. This includes:
    •The different kinds of performance benchmarking engagements
    •Metrics: why the “right” metrics matter, and an introduction to the variety of metrics that may be relevant to your business
    •Terminology basics: iops, op/s, throughput, bandwidth, latency/response time
  • The first installment of our performance benchmarking Webcast series, “Storage Performance Benchmarking: Introduction and Fundamentals” aims to bring anyone untrained in the storage performance arts to a common base with the experts. In this first webcast, gain an understanding of the complexities of benchmarking modern storage arrays and learn the terminology foundations necessary for the rest of the series. This includes:
    •The different kinds of performance benchmarking engagements
    •Metrics: why the “right” metrics matter, and an introduction to the variety of metrics that may be relevant to your business
    •Terminology basics: iops, op/s, throughput, bandwidth, latency/response time
  • Channel
  • Channel profile
  • A Great User Experience – Why it’s Critical for Successful Identity Management Aug 19 2015 5:00 pm UTC 60 mins
    John Hawley; VP of Security Strategy at CA Technologies & Hila Gvir; Senior Principal Product Manager at CA Technologies
    A successful Consumer-Scale Identity Management Deployment is far more than just adding more users. The user experience becomes critical in the success of the deployment as a new type of user begins to interact directly with the identity infrastructure. This webcast will show how to sell these projects to the business and how to create a user experience that will help ensure its success.
  • Constrained or Unleashed:Is your Identity Mgt Ready for Consumer-scale Business? Recorded: Jul 29 2015 57 mins
    John Hawley, Vice President of Security Strategy at CA Technologies
    Consumer-Scale Identity Management Deployments require different approaches than the typical employee use case. However, there are profound benefits - from overall risk reduction to enhanced engagement and loyalty with customers. This webcast will highlight the key challenges in moving identity management from the IT user to a much larger business user population and highlight best practices for success.

    As a two part series, this webcast will be followed by "Improving Your User Experience for Successful Consumer-Scale Identity Management", scheduled on August 19th.
  • Securing Smart Devices: Cybersecurity in the age of the Internet of Things Recorded: Jun 25 2015 61 mins
    Ed Moyle, Director, Emerging Business and Technology Trends, Research/Standards & Academic, ISACA
    There’s no doubt about it, smart devices are proliferating – and as they do, security pros have their work cut out for them. Not only are consumer devices on the rise that have embedded networking and computing technology (e.g. televisions and household appliances), but we’re also seeing integration in other areas as well: everything from automobiles to thermostats to smoke detectors now might ship with networking capability built in.

    For security practitioners in enterprise, this can have serious ramifications: not only do they potentially require traditional “security hygiene” activities (e.g. patching and monitoring), but they can also introduce other complexities as well. For example in situations where they might find their way into regulatory-governed environments (e.g. the PCI cardholder data environment) or when adoption happens without involvement from IT.

    This round table session will discuss how enterprises can approach securing the Internet of Things in their environments and how they can adjust their security programs to ensure that the environment stays protected going forward.

    Panelists:
    Scott Morrison, Senior Vice President and a Distinguished Engineer at CA Technologies
    Chris Poulin, Research Strategist, X-Force at IBM
    Gunnar Petersen, Founder/Principle Arctec Group & Visiting Scientist @ Carnegie Mellon
  • Preventing Data Breaches with Risk-Aware Session Management Recorded: May 14 2015 61 mins
    Russell Miller, Director, Security Solutions & Carol Alexander, Head of Product Marketing for Authenticat
    Strong authentication and Single Sign-On can be a powerful combination to mitigate the threat of data breaches while providing a convenient user experience, but is that enough? What happens if credentials are stolen? What can be accessed during the session?

    Please join Carol Alexander, Director, Authentication Solutions and Russ Miller, Director, Security Solutions to learn how Intelligent Authentication and Single Sign-On including Risk-Aware Session Management can help improve session security.
  • Mastering the Top 5 New Requirements in Access Management Recorded: Apr 21 2015 55 mins
    Aaron Berman, Security Solutions Advisor and Russell Miller, Director, Security Solutions at CA Technologies
    Access Management has grown consistently more challenging as your business requires secure engagement with new user groups and additional partners via mobile, cloud and social channels. In order to securely enable such a multi-channel, open enterprise you must:
    • Facilitate secure federation with a large number of partners
    • Enable the use of social identities
    • Securely connect to Cloud-based services
    • Extend access and security to mobile applications and devices
    • Protect against existing and evolving threats

    Please join Aaron Berman, Security Solutions Advisor and Russell Miller, Director, Security Solutions at CA Technologies, to learn how the latest Access Management capabilities can help you meet these rapidly evolving requirements and deliver secure applications on a timely basis.
  • Best of Both Worlds: Authentication That is Both Secure and Convenient for Users Recorded: Mar 24 2015 49 mins
    Charley Chell, Sr. Director, Security Solutions at CA Technologies
    Most two-factor authentication credentials offer high levels of security, but reduce usability; others offer limited security but are very easy to use. Risk-based authentication adds dynamic risk analysis to your authentication framework, while helping to maintain a frictionless experience for the user.

    Please join Charley Chell, Sr. Director, Security Solutions at CA Technologies to learn how you can enhance the value of two-factor authentication and strengthen the security posture of your organization with risk-based authentication.
  • Briefings Part 6: Identity Management and APIs – The Evolution Continues Recorded: Feb 12 2015 59 mins
    John E. Hawley, Jr., VP, Strategy for Security Solutions; CA Technologies; Brandon Dunlap
    The Identity Management market has been buffeted over the past two years by several important trends – cloud, mobile, social media, and increased app velocity, among others. These trends have dramatically shaped the identity landscape, and changed the security strategy and tactics that many companies have adopted. But, these changes are not finished. In this webcast, we'll look at the next phase of identity management and APIs, and how the continuing trend towards cloud services and the explosion of mobility and applications will continue to shape the role of Security. We will also offer best practice guidelines for dealing with these continuing changes.
  • Cyber-Defense: Are you Toast? Recorded: Feb 5 2015 34 mins
    Russell Miller, Director, Security Solutions, CA Technologies
    Attackers continue to expose vulnerabilities at the world’s most recognized organizations. They are more skilled, more dedicated and supported by more resources than ever. While no one wants to be the “next one”, the key lies in understanding that privileged identities are at the heart of every highly-damaging breach.

    Please join Russell Miller, Director, Security Solutions and Steven McCullar, Advisor, Solution Strategy for CA Technologies to learn how protecting privileged identities can help bring the best security controls to the chokepoint of a potential attack. With the right controls in the right places, you can be well positioned to be in the headlines for only the right reasons.
  • Customer-focused Identity Management: Improve Relationships and Security Recorded: Jan 29 2015 61 mins
    Andrew Kellett, Principal Analyst at Ovum & Sumner Blount, Director, Security Solutions for CA Technologies
    In the application economy, increasing demand from customers to engage with modern businesses online, through social media and via mobile applications, has generated new requirements for customer-focused Identity and Access Management (IAM).

    Join us on January 29, 2015 at 11am EST, when Andrew Kellett, Principal Analyst at Ovum, will offer practical guidance for aligning your IAM strategy to support both user experience and security controls, which evolve throughout the customer lifecycle. He will explore the unique challenges of customer-focused IAM and how it can be leveraged to improve customer relationships. Sumner Blount, Director, Security Solutions for CA Technologies, will join the discussion to illustrate key technologies that can support effective and secure customer-focused IAM deployments.
  • Turning the Confusing Identity Management Landscape into a Strategic Plan Recorded: Jan 22 2015 46 mins
    Guest speaker Andras Cser, VP & Principal Analyst, Forrester Research, Inc., Sumner Blount, Director, CA Technologies
    In the Application Economy, factors such as mobility, cloud, social media and the Internet of Things demand new ways of managing identities and access across your increasingly mobile users.

    On January 22, 2015 at 11am EST, guest speaker Andras Cser, VP and Principal Analyst at Forrester Research, Inc., will explore how these factors are changing the identity and access management (IAM) landscape and discuss the impact of Customer IAM. He will highlight specific predictions for how identity-based security will evolve in the coming year and offer specific guidance for how to improve your customer engagement and plan a successful security strategy. Sumner Blount, Director, Security Solutions for CA Technologies, will join the discussion to provide further insight and practical guidance.
  • Briefings Part 5: The Business of Identities – Predictions for 2015 Recorded: Jan 15 2015 61 mins
    Michelle Waugh, VP Security Solutions, CA Technologies
    Last year, experts at CA Technologies offered a set of predictions about interesting trends in the identity market and its related technology areas. In this webcast, we will review those predictions and rate ourselves on how we did. But, more importantly we will fearlessly offer predictions about what will be happening in the world of identities during 2015, and offer specific guidance into what organizations can be doing now to prepare for these changes.
  • Briefings Part 4: Your Business is Exposed: Avoiding API Security Vulnerabilites Recorded: Dec 18 2014 58 mins
    Francois Lascelles, Chief Architect, CA Technologies
    APIs are quickly becoming the hacker's new favorite attack vector. Why wouldn't they? They offer a direct path to critical information and business services that can be easily stolen or disrupted. And your private APIs can be exploited just as easily as a public API. So what measures can you take to strengthen your security position? During this webcast, Francois Lascelles, Chief Architect, CA Technologies, will discuss recent API data breaches, the top 5 API security vulnerabilities that are most impactful to today's enterprise, and the protective measures that need to be taken to mitigate API and business exposure.
  • Want to Avoid Security Breaches? Leveraging the NIST Framework for Cybersecurity Recorded: Dec 4 2014 62 mins
    Jamie Brown, Director of Global Government Relations & Sumner Blount, Director of Security Solutions, CA Technologies
    Is your organization worried about joining the ranks of other companies that have suffered breaches recently? Are you concerned whether your cybersecurity procedures and technologies will protect you from similar insider threats and external attacks?
    The NIST Framework for Improving Cybersecurity defines guidelines and best practices for improving cybersecurity across several major areas. But, how do you take this complex framework and use it in your own environment, and what technologies can help you with adherence to it?
    In this webcast, Sumner Blount and Jamie Brown from CA Technologies will explore the Framework to help you develop a plan for improving cybersecurity in your own environment. We will focus on the Protect function because of its critical importance for protecting assets from improper access and use. Join us to learn how you can leverage identity management and the NIST guidelines to help your organization avoid the impact of a public breach.
  • Briefings Part 3: End-to-End Mobile Security, Samsung Knox and CA Technologies Recorded: Nov 20 2014 57 mins
    Leif Bildoy, Product Management CA Technologies​; Jeff Moles, Samsung KNOX Product Mgmt; Brandon Dunlap
    As the largest Android device manufacturer Samsung understands the value as well as the security implications that apps have introduced. While businesses are reshaping delivery models to capitalize on its opportunities, security risks are forcing organizations to think differently. Controlling access to the app is no longer sufficient. Instead, businesses have to take an end-to-end security approach – protecting access from the app to the backend API. Please attend this webinar to hear Leif Bildoy, Product Manager at CA Technologies, discuss how Samsung has increased the security within its KNOX Workspace to deliver end-to-end security while maintaining the ever important user experience.
  • Briefings Part 2: Are You Prepared For the Next Attack? Recorded: Oct 23 2014 57 mins
    Christopher Wraight & Carole Gunst, Directors, Security Solutions, CA Technologies
    Today, usernames and passwords continue to be stolen and exploited in record numbers. Hackers are still stealing credentials and accessing sensitive data. To stay ahead of hackers, you need to combine the appropriate forms of authentication and application access/session management to reduce risk and to prevent security breaches before they happen. Please join CA Technologies to learn about risk appropriate authentication and SSO/access management capabilities that can help protect your organization from hackers and their popular attack vectors.
  • Briefings Part 1: Unleashing The Power of Consumer Identity Recorded: Sep 25 2014 62 mins
    Merritt Maxim, Director, Security Solutions for CA Technologies
    How can today’s enterprises position themselves to best leverage large consumer populations in ways that meet the business’ requirements without overwhelming the IT organization? In this webinar, Merritt Maxim, Director, Security Solutions for CA Technologies, will discuss the key requirements to deliver consumer scale identity management and examine how capabilities such as user management, social login and risk-based authentication can help organizations realize the full value of consumer identities, while providing a simple user experience and one which helps keep risks in check.
  • Cloud IAM for Seamless Access to SaaS and On-Premise Apps Recorded: Sep 18 2014 59 mins
    David Gormley, Director, Security Solutions at CA Technologies
    In the application economy, it is critical to simplify access to applications delivered from the enterprise and cloud – and do so quickly, securely and cost effectively. Cloud IAM, or Identity and Access Management as a Service (IAMaaS), can be deployed with or without on-premise IAM products to provide seamless access for your employees, partners and customers.

    Join David Gormley, Director, Security Solutions at CA Technologies, to learn how Cloud IAM can be easily integrated with existing IAM components to provide additional flexibility and scalability without burdening your IT infrastructure.
  • Privileged Identities: The Choke Point for Advanced Attacks Recorded: Sep 11 2014 63 mins
    Russell Miller, Director, Security Solutions at CA Technologies & Nimrod Vax, CA Technologies
    The most damaging attacks, whether from inside or outside the organization, have one thing in common: the use of privileged identities. Attackers use authorized or compromised privileged identities to gain access to information, attack new systems, and hide their tracks. Restricting access to compromised accounts is simply not enough. To mitigate damage from these attacks, a combination of capabilities, including fine-grained controls and governance is needed.
    Join Russell Miller, Director, Security Solutions at CA Technologies to learn how with the right blend of processes and controls on privileged accounts, you can create a comprehensive and cohesive approach to securing your organization where it matters most.
  • BYOID: New Ponemon Institute Study on Key Digital Identity Trends (APJ Event) Recorded: Sep 11 2014 48 mins
    Merritt Maxim, Director, Security Solutions for CA Technologies
    While Bring Your Own Identity (BYOID) can deliver tangible benefits to end users and relying parties, these benefits are accompanied with potential risks and liability concerns. CA Technologies and the Ponemon Institute recently conducted a worldwide survey of over 2,500 IT users and business users to understand the value, benefits and concerns that organizations have around using BYOID.

    Please join Merritt Maxim, Director, Security Solutions for CA Technologies who will review the key findings from the survey, deliver insight into the current state of BYOID and provide guidance on how organizations can overcome these barriers to gain the maximum value from BYOID without unnecessarily increasing risk or fraud
  • Retail Security: Don’t Be the Next Breach Headline Recorded: Aug 21 2014 33 mins
    Russell Miller, Director, Security Solutions and Michael Dullea, Sr. Principal, at CA Technologies
    2013 has been called “The Year of the Retail Breach.” Many organizations are struggling to maintain a comprehensive defense strategy while supporting customers with an engaging experience through mobile devices and social platforms. Retailers in particular have become increasingly aware of their vulnerability and are now searching for comprehensive approaches to security in 2014.

    Please join Russell Miller, Director, Security Solutions and Michael Dullea, Sr. Principal, at CA Technologies, to understand common attack scenarios and learn how you can help protect critical systems, from Points-of-Sale (POS) to back-end infrastructure and supporting systems.
Educational webcasts for the IT Security Professional
The CA Technologies IT Security solutions help CSOs and security professionals move the business forward by facilitating growth, innovation and collaboration, and driving IT operational excellence, all while managing risk and compliance. CA Technologies will show you how businesses can gain the control they need over physical, virtual, and cloud IT environments—so they can protect the business and the information on which it relies.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Meeting the Ongoing Challenge of Identity and Access Compliance
  • Live at: Jun 19 2012 5:00 pm
  • Presented by: Sumner Blount, Sr. Principal, CA Technologies Security Business Unit
  • From:
Your email has been sent.
or close
You must be logged in to email this