Meeting the Ongoing Challenge of Identity and Access Compliance

Sumner Blount, Sr. Principal, CA Technologies Security Business Unit
As new regulations (HITECH) arise, and existing ones introduce more stringent requirements (HIPAA, PCI), compliance remains an ongoing challenge for many organizations. Because manual compliance controls introduce expense and increase risk, Identity and Access Management (IAM) provides an excellent foundation on which to implement automated controls for continuous compliance. This webcast will provide a maturity model for compliance controls, and highlight critical capabilities for identity-related compliance in enterprise and cloud environments.
Jun 19 2012
54 mins
Meeting the Ongoing Challenge of Identity and Access Compliance
Join us for this summit:
More from this community:

IT Security

Webinars and videos

  • Live and recorded (4557)
  • Upcoming (135)
  • Date
  • Rating
  • Views
  • Channel
  • Channel profile
Up Down
  • Be Smarter than a Hacker. Intelligent Authentication Must be Strong & Risk-Based May 8 2014 4:00 pm UTC 60 mins
    In the past – and even now - IT departments have employed authentication methods that required end users only to provide a valid user ID and a password. Hackers have been successfully targeting user names and passwords as an entry point for malicious attacks for some time. To stay ahead of hackers, you need best practice Intelligent Authentication methods that include both strong and risk-based authentication.

    Please join Carole Gunst, Sr. Principal and Charley Chell, Sr. Director, Security Solutions from CA Technologies to learn which Intelligent Authentication methods are essential and what you can do to protect your organization with authentication methods that are both strong and risk-based.
  • Enabling and Securing Multi-Channel Customer Interactions Recorded: Apr 24 2014 59 mins
    Today's organizations are moving more interactions online through web, mobile and API-enabled web services to empower their customers and increase revenue. Managing the high volume of customer identities and enabling secure interactions across a set of web, mobile and hybrid apps, from a variety of different devices can be challenging.
    On April 24th at 1pm ET, please join David Gormley, Director, Security Solutions for CA Technologies, to learn how you can securely accelerate the delivery of new applications and services, while improving the customer experience across multiple channels of interaction.
  • Single Sign-On is Critical to Business Objectives (Global Event) Recorded: Apr 16 2014 30 mins
    Dynamic forces such as cloud, mobile and social media are forcing IT leaders to change their approach to security. This raises an important question: how should you manage identity and access effectively while juggling business objectives of speed, cost effectiveness and positive customer experience?

    With identity as the new perimeter, single sign-on can be the foundation of both managing risk and reaping the benefits of these new business strategies.

    Please join Ken Ang, Security Solution Strategist for CA Technologies, to learn more about management of user identities throughout their lifecycle and access rights across multiple platforms, with a single, scalable and reliable solutions.
  • Identity Management: The Foundation of Secure Business Recorded: Mar 12 2014 45 mins
    Providing convenient user access to systems and applications, while managing risk and governing access, remains the key challenge that IT and Security need to overcome to support critical business functions. As the number of users multiplies and devices, systems and platforms grow increasingly diverse, sophisticated identity management capabilities such as automated provisioning and end-user self-service functions are required to support business growth in the emerging open enterprise.

    Please join us for this webcast, when Merritt Maxim, Director, and Bob Burgess, Advisor, Security Solutions from CA Technologies will discuss how identity management and governance solutions from CA Technologies can facilitate the common identity-related tasks such as provisioning, entitlements certification and access requests to enable secure business growth and a simplified user experience.
  • A Dream or Necessity? Achieving Unified Web and API Access (Global Event) Recorded: Mar 12 2014 48 mins
    The multi-channel organization is here and you can thank the Application Programming Interface (API). While the Web has served as the primary form of user engagement, the mobile channel has expanded how organizations reach consumers and employees, with the API acting as the fundamental connectivity point. As your organization rolls out multi-channel environments, can you avoid siloed management and security, or are there practical steps you can take to achieve unified access?

    Please join Cheng Jang Thye, Principal Business Tech Architect for CA Technologies, to discuss how unified access can be achieved by leveraging your existing web application management investment when deploying API security and management solutions. You will learn the opportunities APIs can provide to your business, the required components of an API solution, how CA Layer 7 API solutions integrate with CA SiteMinder web access solutions, and get an overview of the recently available policy integration with the release of CA Layer 7 API Gateway 8.0.
  • Identity Management and Governance for SAP Environments Recorded: Mar 5 2014 43 mins
    When requesting access to systems or applications, business users need to know the potential risks of such actions to enable compliance with internal business policies and government regulations. The cost for non-compliance can be high. As a result, organizations are seeking solutions that combine automated Segregation of Duties (SoD) risk analysis with robust capabilities for user provisioning and user management, to manage user access and prevent out-of-policy activities.

    Please join Bob Burgess, Solution Strategy Advisor at CA Technologies, and James Rice, Director of Customer Solutions at Greenlight Technologies, to learn how you can obtain better visibility into your SAP/GRC environments and manage the risk of over-privileged users and SoD violations.
  • The Threat of Session Hijacking and How You Can Prevent It Recorded: Feb 19 2014 41 mins
    Session Hijacking is a serious security threat where the cookie used to authenticate a user to a remote server is stolen and then used by an attacker to assume the victim’s identity and take over their session. Since the user session appears to be valid, it is difficult to detect once the hijacking has occurred, so pre-emptive steps need to be taken upfront.

    Please join Chris Wraight, Director, Security Solutions and Aaron Berman, Security Solutions Advisor at CA Technologies to learn why this security gap exists and explore solutions to assist in preventing such attacks.
  • Security Update: 2013 Takeaways and Predictions for 2014 (Global Event) Recorded: Feb 18 2014 59 mins
    Opening up the enterprise to enable new, revenue generating ways of engaging employees, partners, and customers, while still protecting the business, intellectual property and customer privacy continues to present new opportunities and challenges for security professionals.

    As 2014 starts out, it’s time to review which important trends have emerged or shifted in the last year, what we learnt from them and also predict what we expect will happen in the world of identity and cyber-security in the next 12 months.

    Our takeaways and predictions are based on gathering thoughts and ideas from many customers, practitioners and industry experts, and synthesizing it down to a key set of insights that provide a clear and practical guide for your enterprise security strategy and roadmap.

    Please join Reuben Koh, Director, Security Strategy for CA Technologies, for a thought provoking, actionable discussion on where we’ve come and where we are heading.
  • Security Series Part 6: Unleashing the Power of Big Data through Secure APIs Recorded: Feb 13 2014 62 mins
    Quite often what makes an organization unique can be found in the volumes of data it has stored and hidden from the outside world. But while access is prevented and data is protected, new revenue streams are prohibited. Please join us to learn how securely externalizing your core Big Data assets through a Secure API Data Lens can result in new business models and revenue streams never attainable until now.
  • It’s Okay to be a Control Freak! (Over Privileged Identities) Recorded: Feb 11 2014 58 mins
    When it comes to managing privileged identities, it’s ok to be a “control freak” in order to prevent harmful results such as data loss and destruction, malicious damage, fines, and lawsuits. Auditors are also requiring that their clients proactively demonstrate the ability to control privileged users and report on their activities. Managing passwords for privileged accounts is a starting point, but there is more you can do to help secure your IT environment.

    In this webcast, join Russell Miller, Director, Security Solutions and Steven McCullar, Advisor, Solution Strategy, Security Solutions for CA Technologies, to learn how you can help ensure that your environments are protected by implementing least privilege access and fine-grained access controls.
  • SaaS Versus On-Premise…Deployment Reality Recorded: Feb 5 2014 39 mins
    Webinar 2 builds upon the information presented in the Webinar 1: SaaS Versus On-Premise…What Are My Options? In Webinar 2, we take a deeper dive into the decision making process that leads to the right model for your enterprise systems or utility services.

    Some of the issues that need analysis when making a cloud/no-cloud decision include analysis of the costs, understanding the use cases, looking at security and governance, and the value of time-to-market and agility. The idea is to weigh the positives and the negatives, understand the core metrics, and then make a decision based upon the best available information.

    We’ll explore how to understand the deployment realities when considering an on-premises versus SaaS solution. We’ll suggest a decision model and step-by-step process to define the core metrics for the decision, and provide some helpful experiences from the trenches from those who have made these critical calls in the last several years.

    Topics covered include:

    •Step 1: Comparing Costs
    •Step 2: Understanding Use Cases
    •Step 3: Considering Security and Governance
    •Step 4: Considering Time-to-Market and Agility
    •Step 5: Pulling the Trigger
    •Step 6: Considering Operations
  • Your APIs Are Exposed: Avoiding the Top 5 API Security Vulnerabilities Recorded: Jan 29 2014 54 mins
    APIs are quickly becoming the hacker’s new favorite attack vector. Why wouldn’t they? They offer a direct path to critical information and business services that can be easily stolen or disrupted. But there’s a new wrinkle. As demonstrated during the widely publicized Snapchat data breach, a private API can be exploited just as easily as a public API. So what measures can you take to strengthen your security position?

    In this webcast, Francois Lascelles, Chief Architect, CA Technologies Layer 7, will discuss recent high profile API data breaches, the top 5 API security vulnerabilities that are most impactful to today’s enterprise, and the protective measures that need to be taken to mitigate API and business exposure.
  • SaaS Versus On-Premise…What Are My Options? Recorded: Jan 23 2014 44 mins
    The growth of cloud computing is due largely to the growth of software-as-a-service (SaaS). The SaaS consumption model, in many cases, provides more agility and cost efficiencies than traditional methods of consuming software. While SaaS is indeed a consideration, there are instances where it’s just not a fit. Recognizing when to go SaaS and when to stay on-premise is a problem that enterprises will wrestle with now and into the future, as cloud computing continues to gather momentum.

    The truth is that the SaaS model is not always a good fit, and neither are traditional approaches to software deployment and operations. You have to consider many options, requirements, and technologies to understand what’s right for your specific needs.

    In this Webinar, we’ll take the mystery out of how to select SaaS-delivered solutions or traditional on-premise approaches. We’ll explore the requirements to consider, and the types of technologies available.

    Topic covered, include:

    •Defining the options, including SaaS and on-premise
    •Understanding the technology options
    •Understanding the cost advantages
    •Understanding fit-for-purpose
    •Charting a path to the right decision
  • The New Age of Identity: Survival of the Federated Recorded: Jan 22 2014 59 mins
    As the ability to adapt to new trends such as social identity, SaaS and mobile users becomes a competitive differentiator, many organizations are leveraging identity federation to both support new customer engagement and control the sharing of information externally. In this webcast, featured Gartner analyst Mary Ruddy will discuss five key patterns that are driving current trends in identity federation, the effect of those patterns on broader identity and access management (IAM) architecture, and how organizations should be adapting to these changes. In this session, you will learn how to identify which situations would benefit most from identity federation, how to determine the appropriate authentication level and the role that federation standards such as OAuth and OpenID Connect play in your identity federation deployment.

    Merritt Maxim, Director, Security Solutions for CA Technologies will also provide key insight on how identity federation can help securely enable your business in the new ‘open’ economy and what you can do to control shared information while maintaining availability and accessibility.
  • Security Series Part 5: Key Takeaways from 2013 & Predictions for 2014 Recorded: Jan 16 2014 59 mins
    Opening up the enterprise to enable new, revenue generating ways of engaging employees, partners, and customers, while still protecting the business and privacy continues to present new opportunities and evolve in the marketplace. As 2014 starts out, it’s time to review which important trends have emerged or shifted in the last year, and predict what we expect will happen in the world of identity and cyber-security in the coming year. Our takeaways and predictions are based on gathering thoughts and ideas from many practitioners and industry experts, and synthesizing it down to a key set of insights that provide a clear understanding of where the world of identity and security is going. Please join us for a thought provoking, actionable discussion on where we’ve come and where we are heading in the identity marketplace.
  • Security Series Part 4: The Economics of Digital Identity Recorded: Dec 19 2013 61 mins
    Digital identities help solve a crucial problem in today’s highly interconnected IT world-namely knowing the identity of the individual interacting with you. Unfortunately, there are no ways to perfectly determine the identity of a person or thing in cyberspace. Even though there are numerous attributes associated to a person’s identity, these attributes or even identities can be changed, masked or dumped. This session will look at how organizations can leverage these existing digital identities in a manner that does not increase risk or impede user productivity and satisfaction and also share some recent research from the Ponemon Institute on this topic.
  • Your APIs Are Passing Sensitive Data. Are You Compliant? Recorded: Dec 12 2013 61 mins
    The API economy has arrived and business models are being reshaped to take advantage of the financial opportunities that application development has to offer. However, the data exposed through externally facing Application Programming Interfaces (APIs) can often be sensitive or highly regulated. This can put your company at risk of data compromise or non-compliance.

    Please join Nimrod Vax, VP, Security Solutions and Dana Crane, Sr. Principal, Security Solutions, CA Technologies, to learn about the business opportunities that APIs can deliver, and what you can do to reduce the risk of compromising data, while ultimately maintaining compliance.
  • Strong Authentication is Taking A Risky Turn - Are You Prepared? Recorded: Dec 11 2013 60 mins
    As online threats grow increasingly sophisticated and password weaknesses continue to be exposed, strong authentication has become more popular. Many organizations struggling to balance better protection with user convenience are turning to risk-based authentication. This allows them to evaluate contextual factors such as device identification, geolocation and IP address to determine risk levels, without impacting the experience of legitimate users.

    Please join guest speaker Andras Cser, VP and Principal Analyst at Forrester Research, Inc., and David Gormley, Director, Security Solutions at CA Technologies to learn about the trends and best practices for layered authentication methods and how you can implement a risk-based layer of protection against identity theft, data breaches and fraud.
  • Achieve Unified Web & API Access with CA SiteMinder® & CA Layer 7 Recorded: Dec 4 2013 51 mins
    The multi-channel organization is here and you can thank the Application Programming Interface (API). While the Web has served as the primary form of user engagement, the mobile channel has expanded how organizations reach consumers and employees, with the API acting as the fundamental connectivity point. As your organizations rolls out multi-channel environments, can you avoid siloed management and security, or are there practical steps you can take to achieve unified access?

    Please join Ben Urbanski, Sr. Solution Architect from CA Layer 7 Technologies and Herb Mehlhorn, Advisor Product Management for CA SiteMinder, discuss how unified access can be achieved by leveraging your existing web application management investment when deploying API security and management solutions. You will understand the opportunities APIs can provide to your business, the required components of an API solution, how CA Layer 7 API solutions integrate with CA SiteMinder web access solutions; and get an overview of the recently available policy integration with the release of CA Layer 7 API Gateway 8.0.
  • Security Series Part 3: Accelerate Mobile App Delivery: API Security for DevOps Recorded: Nov 21 2013 61 mins
    The relationship between Development and Operations continues to become more intertwined as cloud and mobile service expectations rise. Faster application release cycles and improved quality equates to improved operational performance and customer satisfaction. But how can good API Security & Management practices help to accelerate the delivery of mobile apps? And what’s the most effective way to secure them? Please join us to discuss API Security & Management practices to improve your DevOps application delivery process.
Educational webcasts for the IT Security Professional
The CA Technologies IT Security solutions help CSOs and security professionals move the business forward by facilitating growth, innovation and collaboration, and driving IT operational excellence, all while managing risk and compliance. CA Technologies will show you how businesses can gain the control they need over physical, virtual, and cloud IT environments—so they can protect the business and the information on which it relies.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Meeting the Ongoing Challenge of Identity and Access Compliance
  • Live at: Jun 19 2012 5:00 pm
  • Presented by: Sumner Blount, Sr. Principal, CA Technologies Security Business Unit
  • From:
Your email has been sent.
or close
You must be logged in to email this