Hi [[ session.user.profile.firstName ]]

Security Management

  • Date
  • Rating
  • Views
  • We Need a Trust and Transparency Model for The Internet of Things
    We Need a Trust and Transparency Model for The Internet of Things Sean Martin, ITSPmagazine | David Billeter and Naresh Persaud, CA Technologies | Mandeep Khera Recorded: Aug 16 2017 64 mins
    Today, security on the Internet is dependent on the trust between participants on the network. This is challenging because trust involves more than humans in this case and there are over 8.7 Billion devices already online today. And, trust is about to become more involved because, according to a Cisco study, 99% of the things in the world today will be connected to the Internet in the near future which means we will need a new model for trust and digital identity to manage this massive scale of trust we will need.

    In this ITSPmagazine webinar, a panel of subject matter experts will explore the challenges and solutions to building trust on the Internet of things, looking at what identity means in the world of mobile devices and other Internet-connected things. Remember, it's not just the user that has an identity...

    Some of the topics planned for the discussion include:
    - What are some of the devices we see being used in business?
    - Why do devices need identities?
    - What does device-to-user authentication look like?
    - What does device-to-device authentication look like?
    - What role do applications play in the IoT world?
    - How can all of these identities and activities be managed and policies enforced at scale?

    --------

    Moderator
    - Sean Martin, CISSP, Editor-in-Chief at ITSPmagazine

    Expert Panelists
    - David Billeter, CISO at CA Technologies
    - Mandeep Khera, Information Security Thought Leader and Executive
    - Naresh Persaud, Sr. Director Security, Product Marketing, CA Technologies
  • Securing the Connected Mainframe
    Securing the Connected Mainframe Jeff Cherrington, Senior Director Product Mgmt at CA Technologies, Deb Gannaway, Technology Executive at DG Technologies Recorded: Jun 7 2017 57 mins
    Over 62% of security professionals don’t know where all their sensitive data is – do you? The challenge is that the mainframe hosts most of the world’s mission-essential, regulated corporate data and interconnects with everything else in your business - making it more vulnerable to threat than ever before.

    Join Jeff Cherrington, Senior Director of Product Management at CA Technologies and Deb Gannaway, Technology Executive at DG Technologies on June 7th at 2pm EST to learn how to:

    • Find lost, abandoned and even hidden data on your mainframe
    • Classify data based on regulation or sensitivity level to satisfy compliance
    • Protect mainframe data to stay in full control of critical business assets

    Is your as mainframe secure as it should be? Identify the vulnerabilities
  • Stop Fraud Instantly & Reduce CNP Fraud Loss by 25% - hosted by PYMNTS.com
    Stop Fraud Instantly & Reduce CNP Fraud Loss by 25% - hosted by PYMNTS.com James Rendell, VP Payment Security, CA; Paul Dulany, VP Data Science, CA; Karen Webster, CEO MPD Recorded: May 25 2017 59 mins
    Too often card issuing banks suffer significant loss from fraudsters stealing credit card credentials. Typically, these fraudsters use multiple cards from multiple issuers to complete purchases from a single device before the stolen cards can be blocked. The goal is to immediately identify and stop fraudulent transactions, while maintaining a frictionless shopping experience.

    CA Risk Analytics Network (CA RAN) is a unique, e-commerce fraud risk evaluation solution that stops fraud instantly and helps banks cut card-not-present (CNP) fraud losses by 25% and increase fraud detection by 20% (1, 2).

    Please join this exclusive briefing to learn more about CA RAN and how it can help:
    • Tap into the largest network of global cardholders and transaction data, gathered by CA’s industry-leading CA Payment Security Suite
    • Stop fraud immediately with real-time learning and instant risk score updates, based on behavioral analytics
    • Boost top-line revenue, while improved fraud detection reduces potential losses for better bottom-line results

    1. CA data science simulation on 50 CA Payment Security Suite customers.
    2. Results dependent on issuer-defined operational thresholds over a single issuer mode.
  • Securing Privileged Access Across the Hybrid Enterprise
    Securing Privileged Access Across the Hybrid Enterprise Mike Annau, Senior Presales Consultant, CA Technologies Recorded: May 18 2017 48 mins
    Whether they are obtained maliciously or leveraged inappropriately by a valid user, exploited privileged user accounts are the common threat of most data breaches.

    Find out how CA Privileged Access Management (CA PAM) can provide the end-to-end control over privileged users, from the gateway to the server and from the database to the cloud – all from a single management console:

    •Protect against data breaches while improving access protecting administrative credentials and automating login across multiple target devices and platforms with secure single sign-on.
    •Reduce the impact of insider threats monitor, record and audit all activity with immediate playback.
    •Satisfy regulatory compliance and audit requirements with 360˚access controls across all environments including cloud, hybrid and NSX.
  • Password Security: An End of an Error. Hosted by PYMNTS.com
    Password Security: An End of an Error. Hosted by PYMNTS.com Hannah Preston, Solution Strategist, Payment Security Division, CA Technologies & Karen Webster, CEO, MPD Recorded: Apr 3 2017 62 mins
    Say goodbye to the beloved password. The payments industry is about to initiate the biggest global authentication upgrade in over a decade. Are you ready?

    Join Hannah Preston, Solution Strategist, Payment Security Division, CA Technologies and Karen Webster, CEO, Market Platform Dynamics to learn how authentication is evolving; how it could transform your security and user experience; and how you can tackle the choices and consequences.
    •Examine the possible vulnerabilities for consumers and the opportunities for fraudsters
    •Assess physical authentication confidence and the merits of an in-app authentication strategy through biometrics
    •Exploit the experience of organizations, who have already replaced weak authentication
    •Learn how the EBA’s decision to relax controversial PSD2 authentication rules could affect your business
  • The Key to Regulatory Compliance? Comprehensive Mainframe Security
    The Key to Regulatory Compliance? Comprehensive Mainframe Security Chip Mason, Director of Mainframe Security Product Management, CA Technologies Recorded: Mar 28 2017 42 mins
    Data privacy regulations and standards are only increasing to improve the protection of your most sensitive business assets; consider the General Data Protection Regulation, EU-US Privacy Shield and Payment Card Industry Data Security Standard (PCI DSS) and more. The reality with data is, the mainframe stores the majority of the world’s corporate data. And the other reality is, not many know where all of that data is, let alone able to facilitate regulatory compliance.

    Join Chip Mason, Director of Mainframe Security Product Management on Tuesday, March 28th to discuss the impact of these regulations to your business, what you need to do to comply, and how comprehensive mainframe security management can help you meet these standards and demonstrate compliance with ease.
  • CA Briefings Part 6: Step 4: Governance and Tying it all Together
    CA Briefings Part 6: Step 4: Governance and Tying it all Together John Hawley, VP Security Strategy, CA Technologies; Brandon Dunlap (Moderator) Recorded: Mar 21 2017 60 mins
    Controlling the access of all users, especially privileged ones, is essential not only for risk reduction but also for easier compliance. But, controlling access isn't enough. Organizations need to govern all user access to ensure that no user has more access than they need, and that segregation of duties policies are enforced. On March 21, 2017 at 1:00PM Eastern, CA Technologies and (ISC)2 will highlight the steps for strengthening the enterprise and increasing customer engagement as well as key aspects of effective identity governance, including for contractors and partners who might have access to your systems. Included in the discussion will be key capabilities and processes to help create leading-edge identity governance deployments that can improve the security of your critical data and simplify compliance audits.
  • Mainframe Security 101: What Your CISO Needs To Know
    Mainframe Security 101: What Your CISO Needs To Know Jeff Cherrington, Senior Director of Mainframe Security Product Management, CA Technologies Recorded: Feb 15 2017 59 mins
    The mainframe is mission essential in the application economy and hosts the majority of the world’s corporate data, processes over 2.5 billion mobile transactions per day and touches 55% of all applications. And while the connected mainframe drives significant business value, it also brings sophisticated threats and looming regulations along with it.

    Join Jeff Cherrington, Senior Director of Mainframe Security Product Management at CA Technologies for an overview of the mainframe security landscape, examine how the mainframe fits into the overall enterprise security strategy, and best-practices on how to secure the most sensitive and regulated data in the business - from access control to data protection to compliance.
  • Successful Identity Management Deployments – Don’t forget the user experience
    Successful Identity Management Deployments – Don’t forget the user experience Sumner Blount, Director, Security Solutions, CA Technologies Recorded: Jan 18 2017 57 mins
    A critical element to the success of an identity management deployment is the user experience, but it’s often overlooked, or not given high enough priority. An identity management deployment without a seamless, convenient user experience could be the make or break point for success.

    This webcast will highlight critical components of a convenient and secure user experience. Attendees will learn:
     Current trends in identity management and governance
     Essential characteristics of employee, partner, and customer identity management
     Key attributes of a successful identity management user experience with examples
     Recommendations for a successful identity management deployment
  • CA Briefings Part 5: Annual Trends/Predictions
    CA Briefings Part 5: Annual Trends/Predictions Nick Nikols, Senior VP and Cybersecurity Business CTO, CA; Brandon Dunlap, Moderator Recorded: Jan 12 2017 58 mins
    2016 was a blockbuster year for cybersecurity -- from a hacker influenced national election to a landmark breach into the Internet of Things that caused the largest botnet attacks in history. What’s in store for 2017? On January 12, join CA Technologies’ Nick Nickols, Security CTO, as he examines the evidence and trends that predict what you can expect in 2017. In this webcast, Nick will discuss:
    ·Key areas to focus your attention and investment - from access governance to threat analytics to IDaaS
    ·The changing landscape of regulations and consumer behavior
    ·Technology transformations and new innovations that will influence the way you prepare for 2017

Embed in website or blog