Identity is the New Perimeter

John Hawley, Director, Business Unit Strategy, Security Solutions at CA Technologies
Enterprises are continuing to adopt cloud services, including software, infrastructure and platform as a service. Many times the purchase is done by the business leaders without involving the Security, or even the IT Operations, teams. The business value is great, but IT Security and Operations are struggling to figure out how to secure the new, distributed application environment. In this session we will discuss how to make “identity the new perimeter” and manage control of access to distributed applications. A new model for identity management and authentication can prepare IT and Security to enable access to new business services quickly and efficiently.
Jan 19 2012
42 mins
Identity is the New Perimeter
More from this community:

IT Security

  • Live and recorded (5260)
  • Upcoming (138)
  • Date
  • Rating
  • Views
  • Join Tom Kellerman, Chief Cyber Security Officer for Trend Micro, in an informative webinar specifically tailored for corporate executives and directors who need to develop and implement a comprehensive cyber security strategy. Tom will highlight critical information including 2015 cyber threat trends and how risk management strategies have changed.

    During this live webinar, you’ll learn:
    • How to identify, classify, and protect your valuable data assets
    • How to assess your organization’s vulnerability to attack
    • How to measure and mitigate cyber risks cost-effectively
    • And more...
  • A new category of threat is emerging – a threat designed to evade traditional signature-based technologies such as Anti-Virus and Intrusion Detection. Attempting to meet the challenge is a new class of technology, “Advanced Malware Protection” or “AMP,” which is an industry term for technology designed to continuously monitor for, offload and detonate files in a sandbox - safely away from the main environment - to observe and detect malicious objects.

    If a security device produces an alert in the forest, who’s there to hear it?

    The challenge is these next generation advanced malware detection solutions produce so much detail about the suspicious activity that most organizations do not have the resources to thoroughly investigate/analyze. The best technology means nothing if you don’t have the right expertise to react to the alert, quickly decipher complex reports, investigate the threat, and determine the right response. And meanwhile, the threat actors aren’t standing still – they’re developing measures to circumvent controls in some traditional sandbox environments.

    You will learn:
    1.How the threat is evolving and how actors are employing evasive practices to overcome traditional and even some more sophisticated security defenses
    2.Why next generation sandboxing and full-system emulation are the keys to combatting evasive malware threats
    3.The expertise needed to accurately identify and diagnose the threat once the alert is received
    4.How to ensure your organization has the ability to respond effectively to the incident and close all the backdoors a threat actor may have opened
  • 2014 could have easily been called, “The year of the biggest security breaches since the beginning of forever.” But given current security practices and technologies, many of the breaches could have been prevented. So why weren’t they?

    Many of the affected companies fell into a very common trap, thinking that if a company goes to the trouble to be legally compliant then it will be effectively “secure.” Unfortunately, as with many kinds of regulations, legal compliance really represents the absolute least amount of effort required. If companies want to give themselves the best chance to avoid the very severe consequences that come with a major breach, there are five practices they need to put in place now.

    Join Adrian Sanabria, Senior Security Analyst at 451 Research, and Amrit Williams, CTO of CloudPassage, on this webinar to learn
    · Possible gaps left by the compliance-first approach to security
    · How to limit vulnerabilities across traditional, virtual and cloud infrastructures
    · Five best practices to avoid a major security breach in 2015
  • The bring-your-own-device (BYOD) movement has been a huge boon for businesses that put a premium on productivity. File sync and share solutions have emerged to help employees work from anywhere, at any time, on any device. In this BrightTALK exclusive, eFolder explores the top seven features that business should consider when adopting a file sync and share solution. Learn what is required for a file sync and share solution to improve collaboration, maximize productivity, and ensure security.
  • Join Tom Kellermann, Chief Cyber Security Officer for Trend Micro, in an informative webinar specifically tailored for corporate executives and directors who are ready to take the reins of a real and effective plan to secure their organization, their data, and their careers against targeted attacks.

    During this live webinar, you’ll learn:
    • How to identify, classify, and protect your valuable data assets
    • How to assess your organization’s vulnerability to attack
    • How to measure and mitigate cyber risks cost-effectively
  • The Internet of Things (the new buzzword for the tech industry) is increasing the connectedness of people and things on a scale that was once beyond imagination. Connected devices outnumber the world's population by 1.5 to 1.It is expected to eventually touch some 200 billion cars, appliances, machinery and devices globally, handling things like remote operation, monitoring and interaction among Internet-connected products.

    In combination with the fact that there are almost as many cell-phone subscriptions (6.8 billion) as there are people on this earth (seven billion), we have all the ingredients for a Perfect Cyber Storm.

    Join me for an informal discussion of the challenges for our profession, and some possible solutions.
  • Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key. Join Joe Schreiber, Solutions Architect for AlienVault for this practical session outlining habits to get the most out of your limited resources.

    In this session, you'll learn how to develop routines to efficiently manage your environment, avoid time-sucks, and determine what you can do by yourself and where you need help.

    In this practical session, Joe will cover:
    - How to work around the limitations of a small (or one person) team
    - Tips for establishing a daily routine
    - Strategies to effectively prioritize daily tasks
    - Benefits of threat intelligence sharing
    - Critical investigation & response steps when the inevitable incident occurs
  • Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key. Join Joe Schreiber, Solutions Architect for AlienVault for this practical session outlining habits to get the most out of your limited resources.

    In this session, you'll learn how to develop routines to efficiently manage your environment, avoid time-sucks, and determine what you can do by yourself and where you need help.

    In this practical session, Joe will cover:
    - How to work around the limitations of a small (or one person) team
    - Tips for establishing a daily routine
    - Strategies to effectively prioritize daily tasks
    - Benefits of threat intelligence sharing
    - Critical investigation & response steps when the inevitable incident occurs
  • Cutting down on the time taken to complete complex document review cycles allows the modern lawyer to operate at the pace required by their industry.

    Join our webinar to learn top tips for shortening these review cycles without losing document integrity and risking corruption. We’ll also cover what technologies are available to provide a quick and accurate way to improve document review efficiency.
  • FireEye recently released a new report that documents how and why governments around the world are turning to the cyber domain as a cost-effective way to spy on other countries, steal technology, and even wage war.

    Whether it’s sensitive military, diplomatic, or economic information, governments depend on the integrity of their data. If that data falls into the wrong hands, the consequences could be severe.

    In the wake of two apparent state- and government-sponsored attacks, APT1 and APT28, government agencies must understand why they are in attackers’ crosshairs, what attackers might be seeking, and how they can protect themselves.

    Join us for a dynamic discussion with subject matter experts where you will learn:

    •What makes your government-related organization an appealing target – whether you’re a political opponent, business, agency or vendor
    •Why it’s important to determine who could be planning an attack, their motives, and how they might carry out their goals
    •How to assess your level of preparedness and how to protect yourself if you are not ready for this new era of cyber warfare
  • Channel
  • Channel profile
  • Briefings Part 6: Identity Management and APIs – The Evolution Continues Recorded: Feb 12 2015 59 mins
    The Identity Management market has been buffeted over the past two years by several important trends – cloud, mobile, social media, and increased app velocity, among others. These trends have dramatically shaped the identity landscape, and changed the security strategy and tactics that many companies have adopted. But, these changes are not finished. In this webcast, we'll look at the next phase of identity management and APIs, and how the continuing trend towards cloud services and the explosion of mobility and applications will continue to shape the role of Security. We will also offer best practice guidelines for dealing with these continuing changes.
  • Cyber-Defense: Are you Toast? Recorded: Feb 5 2015 34 mins
    Attackers continue to expose vulnerabilities at the world’s most recognized organizations. They are more skilled, more dedicated and supported by more resources than ever. While no one wants to be the “next one”, the key lies in understanding that privileged identities are at the heart of every highly-damaging breach.

    Please join Russell Miller, Director, Security Solutions and Steven McCullar, Advisor, Solution Strategy for CA Technologies to learn how protecting privileged identities can help bring the best security controls to the chokepoint of a potential attack. With the right controls in the right places, you can be well positioned to be in the headlines for only the right reasons.
  • Customer-focused Identity Management: Improve Relationships and Security Recorded: Jan 29 2015 61 mins
    In the application economy, increasing demand from customers to engage with modern businesses online, through social media and via mobile applications, has generated new requirements for customer-focused Identity and Access Management (IAM).

    Join us on January 29, 2015 at 11am EST, when Andrew Kellett, Principal Analyst at Ovum, will offer practical guidance for aligning your IAM strategy to support both user experience and security controls, which evolve throughout the customer lifecycle. He will explore the unique challenges of customer-focused IAM and how it can be leveraged to improve customer relationships. Sumner Blount, Director, Security Solutions for CA Technologies, will join the discussion to illustrate key technologies that can support effective and secure customer-focused IAM deployments.
  • Turning the Confusing Identity Management Landscape into a Strategic Plan Recorded: Jan 22 2015 46 mins
    In the Application Economy, factors such as mobility, cloud, social media and the Internet of Things demand new ways of managing identities and access across your increasingly mobile users.

    On January 22, 2015 at 11am EST, guest speaker Andras Cser, VP and Principal Analyst at Forrester Research, Inc., will explore how these factors are changing the identity and access management (IAM) landscape and discuss the impact of Customer IAM. He will highlight specific predictions for how identity-based security will evolve in the coming year and offer specific guidance for how to improve your customer engagement and plan a successful security strategy. Sumner Blount, Director, Security Solutions for CA Technologies, will join the discussion to provide further insight and practical guidance.
  • Briefings Part 5: The Business of Identities – Predictions for 2015 Recorded: Jan 15 2015 61 mins
    Last year, experts at CA Technologies offered a set of predictions about interesting trends in the identity market and its related technology areas. In this webcast, we will review those predictions and rate ourselves on how we did. But, more importantly we will fearlessly offer predictions about what will be happening in the world of identities during 2015, and offer specific guidance into what organizations can be doing now to prepare for these changes.
  • Briefings Part 4: Your Business is Exposed: Avoiding API Security Vulnerabilites Recorded: Dec 18 2014 58 mins
    APIs are quickly becoming the hacker's new favorite attack vector. Why wouldn't they? They offer a direct path to critical information and business services that can be easily stolen or disrupted. And your private APIs can be exploited just as easily as a public API. So what measures can you take to strengthen your security position? During this webcast, Francois Lascelles, Chief Architect, CA Technologies, will discuss recent API data breaches, the top 5 API security vulnerabilities that are most impactful to today's enterprise, and the protective measures that need to be taken to mitigate API and business exposure.
  • Want to Avoid Security Breaches? Leveraging the NIST Framework for Cybersecurity Recorded: Dec 4 2014 62 mins
    Is your organization worried about joining the ranks of other companies that have suffered breaches recently? Are you concerned whether your cybersecurity procedures and technologies will protect you from similar insider threats and external attacks?
    The NIST Framework for Improving Cybersecurity defines guidelines and best practices for improving cybersecurity across several major areas. But, how do you take this complex framework and use it in your own environment, and what technologies can help you with adherence to it?
    In this webcast, Sumner Blount and Jamie Brown from CA Technologies will explore the Framework to help you develop a plan for improving cybersecurity in your own environment. We will focus on the Protect function because of its critical importance for protecting assets from improper access and use. Join us to learn how you can leverage identity management and the NIST guidelines to help your organization avoid the impact of a public breach.
  • Briefings Part 3: End-to-End Mobile Security, Samsung Knox and CA Technologies Recorded: Nov 20 2014 57 mins
    As the largest Android device manufacturer Samsung understands the value as well as the security implications that apps have introduced. While businesses are reshaping delivery models to capitalize on its opportunities, security risks are forcing organizations to think differently. Controlling access to the app is no longer sufficient. Instead, businesses have to take an end-to-end security approach – protecting access from the app to the backend API. Please attend this webinar to hear Leif Bildoy, Product Manager at CA Technologies, discuss how Samsung has increased the security within its KNOX Workspace to deliver end-to-end security while maintaining the ever important user experience.
  • Briefings Part 2: Are You Prepared For the Next Attack? Recorded: Oct 23 2014 57 mins
    Today, usernames and passwords continue to be stolen and exploited in record numbers. Hackers are still stealing credentials and accessing sensitive data. To stay ahead of hackers, you need to combine the appropriate forms of authentication and application access/session management to reduce risk and to prevent security breaches before they happen. Please join CA Technologies to learn about risk appropriate authentication and SSO/access management capabilities that can help protect your organization from hackers and their popular attack vectors.
  • Briefings Part 1: Unleashing The Power of Consumer Identity Recorded: Sep 25 2014 62 mins
    How can today’s enterprises position themselves to best leverage large consumer populations in ways that meet the business’ requirements without overwhelming the IT organization? In this webinar, Merritt Maxim, Director, Security Solutions for CA Technologies, will discuss the key requirements to deliver consumer scale identity management and examine how capabilities such as user management, social login and risk-based authentication can help organizations realize the full value of consumer identities, while providing a simple user experience and one which helps keep risks in check.
  • Cloud IAM for Seamless Access to SaaS and On-Premise Apps Recorded: Sep 18 2014 59 mins
    In the application economy, it is critical to simplify access to applications delivered from the enterprise and cloud – and do so quickly, securely and cost effectively. Cloud IAM, or Identity and Access Management as a Service (IAMaaS), can be deployed with or without on-premise IAM products to provide seamless access for your employees, partners and customers.

    Join David Gormley, Director, Security Solutions at CA Technologies, to learn how Cloud IAM can be easily integrated with existing IAM components to provide additional flexibility and scalability without burdening your IT infrastructure.
  • Privileged Identities: The Choke Point for Advanced Attacks Recorded: Sep 11 2014 63 mins
    The most damaging attacks, whether from inside or outside the organization, have one thing in common: the use of privileged identities. Attackers use authorized or compromised privileged identities to gain access to information, attack new systems, and hide their tracks. Restricting access to compromised accounts is simply not enough. To mitigate damage from these attacks, a combination of capabilities, including fine-grained controls and governance is needed.
    Join Russell Miller, Director, Security Solutions at CA Technologies to learn how with the right blend of processes and controls on privileged accounts, you can create a comprehensive and cohesive approach to securing your organization where it matters most.
  • BYOID: New Ponemon Institute Study on Key Digital Identity Trends (APJ Event) Recorded: Sep 11 2014 48 mins
    While Bring Your Own Identity (BYOID) can deliver tangible benefits to end users and relying parties, these benefits are accompanied with potential risks and liability concerns. CA Technologies and the Ponemon Institute recently conducted a worldwide survey of over 2,500 IT users and business users to understand the value, benefits and concerns that organizations have around using BYOID.

    Please join Merritt Maxim, Director, Security Solutions for CA Technologies who will review the key findings from the survey, deliver insight into the current state of BYOID and provide guidance on how organizations can overcome these barriers to gain the maximum value from BYOID without unnecessarily increasing risk or fraud
  • Retail Security: Don’t Be the Next Breach Headline Recorded: Aug 21 2014 33 mins
    2013 has been called “The Year of the Retail Breach.” Many organizations are struggling to maintain a comprehensive defense strategy while supporting customers with an engaging experience through mobile devices and social platforms. Retailers in particular have become increasingly aware of their vulnerability and are now searching for comprehensive approaches to security in 2014.

    Please join Russell Miller, Director, Security Solutions and Michael Dullea, Sr. Principal, at CA Technologies, to understand common attack scenarios and learn how you can help protect critical systems, from Points-of-Sale (POS) to back-end infrastructure and supporting systems.
  • BYOID: New Ponemon Institute Study on Key Digital Identity Trends Recorded: Aug 7 2014 56 mins
    While Bring Your Own Identity (BYOID) can deliver tangible benefits to end users and relying parties, these benefits are accompanied with potential risks and liability concerns. CA Technologies and The Ponemon Institute recently conducted a worldwide survey of over 3,000 IT users and business users to understand the value, benefits and concerns that organizations have around using BYOID.

    Please join Larry Ponemon, Chairman and Founder of the Ponemon Institute and Merritt Maxim, Director, Security Solutions for CA Technologies for a review of the key findings from the survey, insight into the current state of BYOID and guidance on how organizations can overcome these barriers to gain the maximum value from BYOID without unnecessarily increasing risk or fraud.
  • Enabling and Securing Multi-Channel Customer Interactions (Global Event) Recorded: Jul 30 2014 59 mins
    Today's organizations are moving more interactions online through web, mobile and API-enabled web services to empower their customers and increase revenue. Managing the high volume of customers identities and enabling secure interactions across a set of web, mobile and hybrid apps, from a variety of different devices can be challenging.

    Please join David Gormley, Director, Security Solutions for CA Technologies, to learn how you can securely accelerate the delivery of new applications and services, while improving the customer experience across multiple channels of interactions.
  • Leveraging the NIST Framework to Improve Cybersecurity Recorded: Jul 24 2014 47 mins
    In February 2014, the National Institute of Standards and Technology (NIST) officially approved and released its Framework for Improving Critical Infrastructure Cybersecurity providing comprehensive guidance to help improve cybersecurity across a range of categories. It has since received significant attention from many organizations and verticals that are seeking best practices for strengthening security controls.

    Please join Sumner Blount, Sr. Principal, Security Solutions and Jamie Brown, Director, Government Relations for CA Technologies to explore the Framework’s goals and recommendations, and discuss key identity management technologies that can help improve your security strategy.
  • Critical Considerations for Securely Mobilizing Your Workforce–Any App, Anytime Recorded: Jul 15 2014 44 mins
    Enabling your mobile workforce is not a one-time effort but a journey. Various mobility considerations will undoubtedly come into play requiring IT to make decisions around what enterprise mobile apps to roll out to various employees and with what kind of access policies. Do you need to deliver mobile device access to existing web applications? Do you need to develop new native mobile apps – for your employees or your customers? And then what’s the best way to manage and secure these mobile apps? Please join Arun Bhattacharya and Tyson Whitten from CA Technologies as they provide customer validated recipes for securely enabling your mobile workforce, while covering everyday use cases for mobile app development, management and security.
  • IAM in the “Age of the Customer”: Balancing Usability and Security Recorded: Jul 10 2014 62 mins
    An increasing portion of your revenue and customer engagement hinges on digital relationships that span multiple channels like web and mobile, and this puts your customers in the driver’s seat more than ever before. Any hitch in securely registering or logging into your website, mobile app, or web services and undue friction when conducting transactions can send prospects and even loyal customers to your competition.

    Please join guest speaker Andras Cser, VP and Principal Analyst at Forrester Research, Inc. and John Hawley, VP of Security Strategy at CA Technologies, to explore the requirements for consistent security across channels of customer interaction and the need to create a new balance between convenience and security. Learn how Customer IAM (CIAM) can both enable and protect digital interactions so you can enhance customer relationships and reduce risk at the same time.
  • Business Hero: Identity Management at Consumer Scale Recorded: Jun 26 2014 47 mins
    Once upon a time, traditional commercial and home-grown Identity Management solutions were sufficient to support the identity and user access requirements of many organizations. Then along came the Internet and its sidekick Mobility to make it easier than ever for consumers, partners and employees to interact with your organization, meaning potentially millions of identities that need to be registered and managed. To the rescue comes a modern identity management solution that can scale to a growing volume of users and is both easy to use and administer.

    On June 26th, please join Merritt Maxim and Bob Burgess, from CA Technologies to learn how the story of identity management has evolved and the latest identity management and governance solutions to help your consumers, business users and administrators live happily, and securely ever after.
Educational webcasts for the IT Security Professional
The CA Technologies IT Security solutions help CSOs and security professionals move the business forward by facilitating growth, innovation and collaboration, and driving IT operational excellence, all while managing risk and compliance. CA Technologies will show you how businesses can gain the control they need over physical, virtual, and cloud IT environments—so they can protect the business and the information on which it relies.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Identity is the New Perimeter
  • Live at: Jan 19 2012 7:15 pm
  • Presented by: John Hawley, Director, Business Unit Strategy, Security Solutions at CA Technologies
  • From:
Your email has been sent.
or close
You must be logged in to email this