Hi [[ session.user.profile.firstName ]]
Sort by:
    • GDPR Use Case Secure: Breach Prevention with Identity Management
      GDPR Use Case Secure: Breach Prevention with Identity Management Robert MacDonald, Identity & Access Management Lead, Micro Focus Recorded: Apr 12 2018 3:20 pm UTC 37 mins
    • How do I best ensure sensitive data is protected, stored, and backed up securely?

      As the impact of GDPR continues to ripple throughout IT, organizations need to understand how their identity and access management ecosystem will be impacted and how identities will need to be managed going forward.

      In this webinar, we cover how GDPR regulations such as data capture, consent, right to be forgotten and more will change identity lifecycle management internally and externally forever.

      Enabling you to find known and unknown threats in real-time through powerful correlation and context, integrated with the leading user behaviour analytics solution. Close security gaps and prevent high value data loss by protecting personal data at data field level and automatically identifying application vulnerabilities for strong applications development operations.

      Read more >
    • The Identity Economy: Evolving from Analog to Digital
      The Identity Economy: Evolving from Analog to Digital Jose Caldera, IDM- Travis Jarae, One World Identity- Blake Hall, ID.me- David Delouya, AlphaPoint- Srikant Movva, HSBC Recorded: Mar 1 2017 7:00 pm UTC 63 mins
    • Digital identities are the lifeblood of the modern digital economy

      As human activity migrates online, challenges for authenticating physical identities arise, while businesses and consumers look around for guidance.

      Increasing demand for answers to the identity verification dilemma was just one of the contributing factors for the emancipation of the identity space as an industry of its own, vertical-agnostic.

      With such an outlook, it is important to understand what a Digital Identity is, and their current role in our society. Furthermore, how to leverage the identities to build better business models, deliver better products and services; and most importantly, how to take the leap and hop on the Identity Evolution train - after all, you don’t want to get left behind.

      We know implementing new technologies, and changing your current operations and processes can be a challenge. And even though the benefits far outweigh the costs, it always helps to have a guiding hand. Today, that guiding hand comes as a framework to understand how digital identities play a beneficial role in each industry and YOUR business, so you can start the journey from analog to digital identities within your organization.

      At the end of the webinar you will:

      - Be able to differentiate physical from digital identities, and the attributes that shape them.
      - Appreciate the function digital identities play today, and their potential to help overcome present [and future] social and economic challenges.
      - Understand the role of Blockchain in the Digital Identity Ecosystem.
      - Recognize the business models that are placing identity at the center: Identity-as-a-Service, or Identity APIs - and how they can reshape the world as we know it.
      - Know WHY and HOW to make the leap over to digital identities within your business.

      Read more >
    • What’s Next In Securing Identities? Key Identity & Access Management Trends
      What’s Next In Securing Identities? Key Identity & Access Management Trends Danna Bethlehem - Director, Product Marketing, Identity Protection Recorded: Feb 13 2017 9:30 am UTC 43 mins
    • Over the past year, we have seen data breaches shift towards identity-based breaches, targeting personal information of either employees or consumers. The access to the information is used to craft and construct highly organized attacks on enterprises and is a growing contributor to identity theft. The problem is compounded by the convergence of personal and work place identities, ultimately creating major security challenges for companies.

      Our 2016 Authentication and Access Management survey found 90% of enterprise IT professionals are concerned that employee reuse of personal credentials for work purposes could compromise security. During the webinar, we’ll be discussing this and other trends in the strong authentication and access management market, including:

      - The status of the two-factor authentication market and what we can expect in the years to come
      - The enterprise risk issues of using social media credentials to access to corporate resources
      - The role the cloud is playing in the enterprise especially as it relates to single sign on and application management and access
      - The ongoing challenges enterprises cite as barriers to mass adoption of a mobile workforce

      Read more >
    • Digital Identity Authorities - The Key to Enterprise Cloud Transformation
      Digital Identity Authorities - The Key to Enterprise Cloud Transformation Loren Russon, VP of Product Management, Ping Identity Recorded: May 24 2018 3:00 pm UTC 49 mins
    • Managing digital identities and access control for users, applications and things remains one of the greatest challenges facing cloud computing today. This has led to a new cloud security service paradigm that requires your organization to reevaluate the criteria for designing and implementing identity and access management (IAM) services across data centers, and private and public cloud infrastructure. This new criteria addresses the continued transformation to the cloud, mobile and internet of things (IoT), and the increased demand for open business balanced by user data security found in initiatives such as GDPR, Open Banking and PSD2.

      In this webinar, you will learn about key requirements and design principles required for modern IAM systems, and how to effectively drive digital transformation, address user data security regulations and ensure you successfully manage your company’s transformation to the cloud.

      Read more >
    • Innovation in Identity & KYC: A Thought Leader Interview
      Innovation in Identity & KYC: A Thought Leader Interview Jodie Paula Cohen of ECN interviews Rob Laurence, Director of Innovate Identity Recorded: Mar 24 2016 10:00 am UTC 21 mins
    • Traditional methods of identity verification are contributing to lengthy and expensive KYC and onboarding processes. Technological advances, regulatory requirements and business necessity are leading organisations to a point where they have to rethink the way identity works.

      With so many financial services institutions embracing digital, the big challenge is bringing together information about each client, from multiple systems, to create one accurate client identity. Achieving this, while demonstrating robust and compliant KYC capabilities, is causing costs to spiral.

      In this exclusive webinar Jodie Paula Cohen, producer of the acclaimed Identity & KYC conference, catches up with leading Identity expert Rob Laurence, Director of Innovate Identity, to gain some practical insights into how these challenges can be tackled.

      Questions will include:

      1) How close are we to being able to access digital information about identity in a consumable and trusted way, across industries?

      2) Which technologies should organisations be looking into, to support their identity and KYC processes?

      3) Is the blockchain a complete solution for improved identity verification, or just part of a wider solution?

      4) How can institutions ensure a user-friendly and compliant KYC and onboarding process?

      5) What are the challenges and benefits of putting in place a ‘financial services passport’?

      Read more >
    • Auditing Machine Identity Protection
      Auditing Machine Identity Protection Kevin Bocek, Vice President, Security Strategy & Threat Intelligence, Venafi Recorded: Jun 14 2018 4:00 pm UTC 64 mins
    • Just as we need to secure human identities, we also need to effectively manage and secure machine identities—whether those machines are servers, applications, appliances, IoT devices or other systems. Transport Layer Security (TLS) certificates and associated private keys serve as the primary method of establishing machine identities. However, organizations are not investing in machine identity protection, even though unmanaged and unsecured keys and certificates risk outages and breaches.

      This session shares a 5-stage approach to TLS security, including what is achieved and can be audited at each stage. This session will enable auditors to assess the overall maturity of an organization’s machine identity protection.

      Read more >
    • How Blockchain Facilitates Self-Sovereign Identity
      How Blockchain Facilitates Self-Sovereign Identity Prabath Siriwardena, Senior Director - Security Architecture, WSO2 | John Callahan, Chief Technology Officer, Veridium Recorded: Apr 12 2018 3:00 pm UTC 60 mins
    • In today’s digital landscape, we don’t own our digital identities. We might be able to control what information we put online, and manage how it’s used to a degree, but once we give that data to Facebook, Google, or Microsoft, they own it. The emerging technology of blockchain has the potential to change that with the concept of self-sovereign identity (SSID).

      With SSID, individuals could maintain control over their digital identities, as well as how it is used and where it is stored. This would benefit businesses and consumers alike, simplifying efforts like KYC that cost financial institutions millions of dollars a year, and preventing data theft or misuse like the current Facebook/Cambridge Analytica fiasco.

      In this webinar, a leading blockchain researcher, Prabath Siriwardena, explores the evolution of identity management in the era of blockchain, introducing the idea of Bring Your Own Identity (BYOID) and self-sovereign identity, and the need for strong authentication using biometrics as part of this innovation. Prabath has over 10 years of experience in identity and access management and is currently leading WSO2’s research into bringing blockchain and federated identity together to better protect user privacy.

      Read more >
    • Digitized identity verification - the future of ID & KYC
      Digitized identity verification - the future of ID & KYC Sarah Clark,Mitek Systems, Mike Montemarano, JP Morgan & Supriyo Guha, GENPACT Recorded: Nov 14 2017 4:00 pm UTC 49 mins
    • Financial institutions from all over the world are facing increasingly strict regulations regarding the verification and authentication of their customers’ identity. Furthermore, with the increasing amount of data breaches, status-quo identity verification processes have not only been compromised but have also made complying with current regulations harder. This ever-changing environment has forced a tipping point for organizations to regard the adoption of new technologies for identity verification as a must-have rather than a nice-to-have.

      In the end, financial institutions must satisfy consumers’ demands for speed and ease of use to prevent them from going to the competition. To gain a competitive edge, remain compliant, and offer a frictionless and user experience, it is imperative for FIs to invest in technologies that bridge the compliance-convenience gap.

      Read more >
    • How Identity Can Integrate Office 365 with HR and Security Systems
      How Identity Can Integrate Office 365 with HR and Security Systems Arun Desouza, CISO at Nexteer Automotive, Sibrina Subedar, Director, Product Marketing at Okta Upcoming: Jun 28 2018 4:00 pm UTC 60 mins
    • Over their 100-year history, Nexteer Automotive welcomed technology advancements and innovations. They continue this journey in the era of digital transformation to fuel productivity, efficiency and innovation.

      While modernizing IT led to automation and productivity gains it also significantly increased their attack surface in a time when cyber threats are all too common. The complexity of legacy infrastructure, on-prem apps, and adoption of cloud apps, produced a multitude of end-user entry points. This complicated both security and user lifecycle management.

      Join CISO Arun Desouza from Nexteer to learn how they used identity as the lynchpin to connect disparate systems and applications. He will discuss how they used identity management to:

      - Reduce reliance on servers and complex architecture requirements of AD FS and MIM while deploying O365 with Azure AD.
      - Improve user lifecycle management by provisioning employees into all on-prem and cloud apps using HR-as-a-Master.
      - Integrate identity with network security infrastructure to reduce breaches and gain immediate visibility to when and where threats take place.

      Don’t want to miss this opportunity to hear how Nexteer used identity architecture to connect everything and improve ease of use, scalability, automation and productivity.

      About the speakers:

      Arun Desouza is Chief Information Security & Privacy Officer at Nexteer Automotive Corporation. Previously, he served as CISO and Director, Strategic Planning and Information Security at Inergy Automotive Systems. Arun’s expertise includes security strategy, risk management, identity management, cloud and privacy.

      Sibrina Subedar is a Director of Product Marketing at Okta. She spent 12 years at Cisco in many roles including Customer Advocacy & Product Management and working across many technologies like routing, switching, security, VoIP. The following 3 years at NetApp she started with product management on security products.

      Read more >
    • The Role of Applicant Behavior in Identity Proofing
      The Role of Applicant Behavior in Identity Proofing Uri Rivner, BioCatch & Al Pascual, Javelin Strategy & Research Recorded: Apr 25 2018 6:00 pm UTC 67 mins
    • As account opening continues to transition from physical to digital channels, financial institutions, issuers, lenders, and other organizations must optimize the digital experience of applicants in order to compete. At the same time, fraud is on the rise as criminals have become more successful than ever, thanks to some of the same digital channel benefits enjoyed by consumers: convenience, speed, and ease of use.

      To achieve the necessary balance between preventing fraud and providing a delightful experience for consumers, an approach to identity proofing that accounts for the channel, product, customer, and threat environment is absolutely critical. But regardless of the approach, inconspicuous solutions — like those based on applicant behavior — have a distinct role to play in how institutions manage the risk of application fraud.

      Read more >