Educational webcasts for the IT Security Professional
The CA Technologies IT Security solutions help CSOs and security professionals move the business forward by facilitating growth, innovation and collaboration, and driving IT operational excellence, all while managing risk and compliance. CA Technologies will show you how businesses can gain the control they need over physical, virtual, and cloud IT environments—so they can protect the business and the information on which it relies.
As you face an increasing number of identities with the inclusion of different types of business users, techniques such as risk-based access and entitlement catalogs become essential to mitigating the risks to your business.
Join CA Technologies for a look at current trends in the industry such as how increased interaction with business users impacts the identity management lifecycle, and the privileged identity management strategies and techniques necessary to guard against breaches. This session will offer recommendations for increasing engagement with identity services across your open enterprise.
Over a billion records were breached last year in online cyber-attacks. Even though the details of these breaches may differ, they often have the same root cause – inadequate control of privileged user accounts and their actions in increasingly complex hybrid environments. On November 12, 2015 at 1:00PM Eastern, join CA Technologies and (ISC)2 as we examine some of the most notorious breaches and the steps that attackers took to take control of these accounts. You will also learn how Privileged Access Management (PAM) can help prevent successful attacks and protect critical corporate and customer information.
In an IT landscape fueled by mobility, cloud services and the internet of things (IoT), the number of applications, users and devices continues to proliferate rapidly—and without the right controls, so do the risks.
On November 5, 2015, join BT Security and CA Technologies for a webcast that defines a new approach to identity and access management. Attend the webcast and discover:
• How in the application economy, user identities have become the new security perimeter.
• Why so many IT teams are unprepared to contend with the escalating demands of identity and access management.
• How organizations can adopt a cloud-based identity and access management approach that strengthens security and enhances the user experience, while reducing ongoing costs, risks and complexity.
Traditional authentication and authorization defenses against fraudulent access attempts have only slowed down cybercriminals and have made gaining access more difficult for legitimate users. Multi-factor authentication and single sign-on can be a powerful combination to mitigate the threat of data breaches while providing a convenient user experience, but is that enough? What happens if credentials are stolen? What can be accessed during the session? Join CA Technologies and (ISC)2 on October 15, 2015 at 1:00PM Eastern to learn best practices for reducing your risk of data breaches caused by fraudulent access. During this session, we will explore how user behavioral profiling can enhance authentication security and how risk-aware session management can help prevent session hijacking.
Rarely has the landscape of security changed as dramatically as in the past year. Applications are now rightfully driving security strategy across organizations of all sizes. Attacks against your critical systems and information are more insidious than ever before. Your customers are demanding access from a variety of devices, across access channels, along with a consistent, intuitive, and convenient user experience. If that wasn't enough, you need to engage with your developer communities to help build those complementary solutions that you need to grow your business. Join CA Technologies for this first part of a six-part webcast series on September 17, 2015 at 1:00PM Eastern to learn how security leaders can rise to the top of the pack by leveraging these new realities, and grow their business through an innovative security vision and strategy.
We live in a world where everything is driven by applications, connectivity, and mobility. Your customers are now far more likely to interact with your enterprise through software than a live person, and employees are conducting more business on mobile devices than traditional laptops and workstations. A critical success factor for thriving in this new reality is the ability for the enterprise to accurately identify users in a way that is both convenient to them and cost effective, while also protecting their identities and data from potential fraudsters.
Join this webcast where Carol Alexander, Head of Authentication Solutions, and Charley Chell, Security Advisor, from CA Technologies will discuss how you can transparently leverage data from mobile devices to help identify the legitimacy of a user attempting to login or perform a sensitive transaction. Learn the key factors and considerations in using contextual authentication within your mobile applications to protect against inappropriate access and data breaches.
A successful Consumer-Scale Identity Management Deployment is far more than just adding more users. The user experience becomes critical in the success of the deployment as a new type of user begins to interact directly with the identity infrastructure. This webcast will show how to sell these projects to the business and how to create a user experience that will help ensure its success.
Consumer-Scale Identity Management Deployments require different approaches than the typical employee use case. However, there are profound benefits - from overall risk reduction to enhanced engagement and loyalty with customers. This webcast will highlight the key challenges in moving identity management from the IT user to a much larger business user population and highlight best practices for success.
As a two part series, this webcast will be followed by "Improving Your User Experience for Successful Consumer-Scale Identity Management", scheduled on August 19th.
There’s no doubt about it, smart devices are proliferating – and as they do, security pros have their work cut out for them. Not only are consumer devices on the rise that have embedded networking and computing technology (e.g. televisions and household appliances), but we’re also seeing integration in other areas as well: everything from automobiles to thermostats to smoke detectors now might ship with networking capability built in.
For security practitioners in enterprise, this can have serious ramifications: not only do they potentially require traditional “security hygiene” activities (e.g. patching and monitoring), but they can also introduce other complexities as well. For example in situations where they might find their way into regulatory-governed environments (e.g. the PCI cardholder data environment) or when adoption happens without involvement from IT.
This round table session will discuss how enterprises can approach securing the Internet of Things in their environments and how they can adjust their security programs to ensure that the environment stays protected going forward.
Scott Morrison, Senior Vice President and a Distinguished Engineer at CA Technologies
Chris Poulin, Research Strategist, X-Force at IBM
Gunnar Petersen, Founder/Principle Arctec Group & Visiting Scientist @ Carnegie Mellon
Strong authentication and Single Sign-On can be a powerful combination to mitigate the threat of data breaches while providing a convenient user experience, but is that enough? What happens if credentials are stolen? What can be accessed during the session?
Please join Carol Alexander, Director, Authentication Solutions and Russ Miller, Director, Security Solutions to learn how Intelligent Authentication and Single Sign-On including Risk-Aware Session Management can help improve session security.
Access Management has grown consistently more challenging as your business requires secure engagement with new user groups and additional partners via mobile, cloud and social channels. In order to securely enable such a multi-channel, open enterprise you must:
• Facilitate secure federation with a large number of partners
• Enable the use of social identities
• Securely connect to Cloud-based services
• Extend access and security to mobile applications and devices
• Protect against existing and evolving threats
Please join Aaron Berman, Security Solutions Advisor and Russell Miller, Director, Security Solutions at CA Technologies, to learn how the latest Access Management capabilities can help you meet these rapidly evolving requirements and deliver secure applications on a timely basis.