Hi [[ session.user.profile.firstName ]]
Sort by:
    • Tackle Synthetic Identity Fraud Head-on
      Tackle Synthetic Identity Fraud Head-on Kevin King and Carmel Maher, ID Analytics and Julie Conroy, Aite Group Recorded: Oct 30 2018 8:40 pm UTC 60 mins
    • Synthetic identity fraud – the act of creating a fake identity to access goods or services – has become a top-of-mind threat for many American financial institutions. Recent research from the Aite Group suggests that synthetic identity fraud losses equate to 20-30% of all credit write-offs, resulting in total losses between $6-9B annually. Synthetic identity fraud is difficult to distinguish from legitimate consumers and without a specific victim to confirm a crime – this type of fraud carries a low-risk, high-reward proposition for criminals that often sits unidentified in a lender’s credit losses.

      In this on-demand webinar, Kevin King and Carmel Maher from ID Analytics along with Julie Conroy from Aite Group, will provide a comprehensive overview of synthetic identity fraud and discuss the factors contributing to the rising impact of this threat. ID Analytics will share new research findings which outline the key differences between synthetic fraud and traditional fraud and credit risk behavior, as well as describe how synthetics are able to circumvent today’s processes. Synthetic identity fraud is a multifaceted problem, one which has left many lenders feeling helpless. There is light at the end of the tunnel; ID Analytic will share best practices for optimizing your detection and prevention strategy to tackle synthetic identity fraud head-on.

      Read more >
    • The Case for Identity Proofing: Reduce Friction, Minimize Risk, & Build Trust
      The Case for Identity Proofing: Reduce Friction, Minimize Risk, & Build Trust Nathan Rowe, Chief Product Officer & Co-Founder, Evident Recorded: Oct 17 2018 6:00 pm UTC 47 mins
    • In today’s digital landscape, is it possible to know with absolute certainty that someone is who they say they are online?

      Physical documentation like social security cards, driver’s licenses, school IDs, and law enforcement credentials can easily be obtained by imposters, and identity proofing is key to avoiding risks associated with theft and impersonation.

      Businesses can and should leverage identity verification now more than ever to reduce friction in their onboarding processes, prevent fraudulent users from accessing sensitive data, and build trust in their brand.

      Companies no longer have to choose between growth and security––new technologies are helping organizations of all sizes operate with confidence, knowing their constituents have been accurately verified.

      In this webinar, we’ll outline the fundamentals and the importance of identity proofing, while providing practical tips for implementation across a variety of use cases.

      Key takeaways:
      How identity proofing works across multiple use cases
      Why identity proofing is a category, not a binary, one-size-fits-all solution
      How authentication differs from verification
      How to automate identity proofing with the latest tools and technologies

      Read more >
    • Modern MFA, Deployable Everywhere
      Modern MFA, Deployable Everywhere Shawn Keve (EVP, Simeio), Vikram Subramanian, (VP, Simeio), Andrew Goodman (Sr Product Marketing Manager, Ping Identity) Recorded: Nov 12 2018 7:00 pm UTC 61 mins
    • Heavy infrastructure, complex administration and poor user experiences are the hallmarks of legacy multi-factor authentication solutions. They're also the reasons why you haven't deployed MFA in more places to protect against the #1 cause of data breaches, compromised credentials.

      A cloud delivered, adaptive MFA solution balances security and convenience for workforce and consumer use cases. It also allows you to deploy MFA everywhere - on every app, API, VPN, within high risk transaction flows and even when logging into corporate devices. But implementing MFA everywhere isn’t easy, and surprising roadblocks can appear along the way.

      Join Shawn Keve, EVP at Simeio Solutions, Vikram Subramanian, VP Solutions Advisory at Simeio Solutions and Andrew Goodman, Sr. Product Marketing Manager at Ping Identity to learn about requirements and best practices for a comprehensive MFA deployment.

      Read more >
    • Integrating Identity Access Management (IAM) with SIEM
      Integrating Identity Access Management (IAM) with SIEM Greg Foss (LogRhythm) and Randy Franklin Smith (UWS) Recorded: Oct 17 2018 5:00 pm UTC 79 mins
    • In this webcast, we take an actual real-world example of a SIEM (in this case LogRhythm), and an IAM (Okta), and demonstrate how their integration matures an organization’s security posture.

      Randy Franklin Smith (of UWS) and Greg Foss (LogRhythm) dive into how Security Analysts can make more informed decisions and perform better investigations when they have a full picture of IAM events spanning on-prem and cloud-based activity — and how organizations can respond rapidly to security alarms with automatic protective measures.

      Greg Foss is a recognized security expert who created LogRhythm Invoke-Okta, a bidirectional integration framework that provides for easy interaction and automation with Okta and the LogRhythm SIEM.

      In this webcast, you'll learn how to:
      • Visualize and analyze data from Okta in your SIEM
      • Identify accounts that have compromised credentials by monitoring for successful authentications paired with failed multifactor logins
      • Utilize the Okta API to automate security tasks
      • Build upon identity monitoring to work towards a “Zero Trust” architecture

      Read more >
    • GDPR Use Case Secure: Breach Prevention with Identity Management
      GDPR Use Case Secure: Breach Prevention with Identity Management Robert MacDonald, Identity & Access Management Lead, Micro Focus Recorded: Apr 12 2018 3:20 pm UTC 37 mins
    • How do I best ensure sensitive data is protected, stored, and backed up securely?

      As the impact of GDPR continues to ripple throughout IT, organizations need to understand how their identity and access management ecosystem will be impacted and how identities will need to be managed going forward.

      In this webinar, we cover how GDPR regulations such as data capture, consent, right to be forgotten and more will change identity lifecycle management internally and externally forever.

      Enabling you to find known and unknown threats in real-time through powerful correlation and context, integrated with the leading user behaviour analytics solution. Close security gaps and prevent high value data loss by protecting personal data at data field level and automatically identifying application vulnerabilities for strong applications development operations.

      Read more >
    • The Identity Economy: Evolving from Analog to Digital
      The Identity Economy: Evolving from Analog to Digital Jose Caldera, IDM- Travis Jarae, One World Identity- Blake Hall, ID.me- David Delouya, AlphaPoint- Srikant Movva, HSBC Recorded: Mar 1 2017 7:00 pm UTC 63 mins
    • Digital identities are the lifeblood of the modern digital economy

      As human activity migrates online, challenges for authenticating physical identities arise, while businesses and consumers look around for guidance.

      Increasing demand for answers to the identity verification dilemma was just one of the contributing factors for the emancipation of the identity space as an industry of its own, vertical-agnostic.

      With such an outlook, it is important to understand what a Digital Identity is, and their current role in our society. Furthermore, how to leverage the identities to build better business models, deliver better products and services; and most importantly, how to take the leap and hop on the Identity Evolution train - after all, you don’t want to get left behind.

      We know implementing new technologies, and changing your current operations and processes can be a challenge. And even though the benefits far outweigh the costs, it always helps to have a guiding hand. Today, that guiding hand comes as a framework to understand how digital identities play a beneficial role in each industry and YOUR business, so you can start the journey from analog to digital identities within your organization.

      At the end of the webinar you will:

      - Be able to differentiate physical from digital identities, and the attributes that shape them.
      - Appreciate the function digital identities play today, and their potential to help overcome present [and future] social and economic challenges.
      - Understand the role of Blockchain in the Digital Identity Ecosystem.
      - Recognize the business models that are placing identity at the center: Identity-as-a-Service, or Identity APIs - and how they can reshape the world as we know it.
      - Know WHY and HOW to make the leap over to digital identities within your business.

      Read more >
    • What’s Next In Securing Identities? Key Identity & Access Management Trends
      What’s Next In Securing Identities? Key Identity & Access Management Trends Danna Bethlehem - Director, Product Marketing, Identity Protection Recorded: Feb 13 2017 9:30 am UTC 43 mins
    • Over the past year, we have seen data breaches shift towards identity-based breaches, targeting personal information of either employees or consumers. The access to the information is used to craft and construct highly organized attacks on enterprises and is a growing contributor to identity theft. The problem is compounded by the convergence of personal and work place identities, ultimately creating major security challenges for companies.

      Our 2016 Authentication and Access Management survey found 90% of enterprise IT professionals are concerned that employee reuse of personal credentials for work purposes could compromise security. During the webinar, we’ll be discussing this and other trends in the strong authentication and access management market, including:

      - The status of the two-factor authentication market and what we can expect in the years to come
      - The enterprise risk issues of using social media credentials to access to corporate resources
      - The role the cloud is playing in the enterprise especially as it relates to single sign on and application management and access
      - The ongoing challenges enterprises cite as barriers to mass adoption of a mobile workforce

      Read more >
    • Taming the Tsunami of Bots, Apps, and Cloud using the Power of Identity
      Taming the Tsunami of Bots, Apps, and Cloud using the Power of Identity SailPoint Technologies Recorded: Oct 11 2018 4:45 pm UTC 39 mins
    • The rapid adoption of software bots, cloud applications and cloud infrastructure has created new security gaps and issues for enterprises due to lack of proper access and governance controls. Using the power of identity, organizations can tame this unyielding tsunami into a wave that will propel you forward to realize a more secure, compliant and efficient infrastructure.

      SailPoint IdentityIQ 7.3 is continuing to push the boundaries of innovation by extending identity for all users, across all applications and data, reducing your organization’s risk profile while ensuring your identity governance strategy is always one innovation ahead.

      Watch this webinar to:
      - Manage, govern and control all digital identities including software bots and Robotic Process Automation (RPA)
      - Accelerate business value with rapid setup and application onboarding
      - Govern AWS and SAP platforms, from a single pane of glass
      - Deploy IdentityIQ in the datacenter or in a hosted cloud environment such as Amazon AWS or Microsoft Azure

      Read more >
    • Digital Identity Authorities - The Key to Enterprise Cloud Transformation
      Digital Identity Authorities - The Key to Enterprise Cloud Transformation Loren Russon, VP of Product Management, Ping Identity Recorded: May 24 2018 3:00 pm UTC 49 mins
    • Managing digital identities and access control for users, applications and things remains one of the greatest challenges facing cloud computing today. This has led to a new cloud security service paradigm that requires your organization to reevaluate the criteria for designing and implementing identity and access management (IAM) services across data centers, and private and public cloud infrastructure. This new criteria addresses the continued transformation to the cloud, mobile and internet of things (IoT), and the increased demand for open business balanced by user data security found in initiatives such as GDPR, Open Banking and PSD2.

      In this webinar, you will learn about key requirements and design principles required for modern IAM systems, and how to effectively drive digital transformation, address user data security regulations and ensure you successfully manage your company’s transformation to the cloud.

      Read more >
    • Government Investigations of a Breach: When Machine Identity Protection Fails
      Government Investigations of a Breach: When Machine Identity Protection Fails Kevin Bocek, VP, Security Strategy & Threat Intelligence, Venafi Recorded: Dec 12 2018 7:00 pm UTC 47 mins
    • What was the biggest breach in 2017? How did it happen? Regulators in the U.S. and U.K. have released a detailed analysis, highlighting how a failure in Machine Identity Protection enabled this complex, lengthy, hidden attack.

      A single untracked, unmanaged digital certificate was left to expire and became the foundation of this attack. Certificates authenticate machine identities for trusted machine-to-machine connections and, when compromised, create a gaping hole in an otherwise well-layered defense.

      Join this webinar and learn how cybercriminals:

      • Use an expired certificate to hide in encrypted traffic
      • Exploit additional vulnerabilities and pivot deeper into the network
      • Continue their attack for months and pilfer millions of files

      Today, well over half of attacks hide in encrypted traffic—and analysts warn that this will only increase. Learn how to defend against these types of attacks and architect effective machine identity protection for your organization. Register now!

      Read more >
    • Machine Identity Protection LIVE
      Machine Identity Protection LIVE Jeff Hudson, CEO, Venafi Recorded: Dec 13 2018 5:00 pm UTC 54 mins
    • As the number of machines on our networks continues to explode how can we make sure that connections and communications between them remain secure? A new era of machine identity protection begins on December 13 at 9 pmPT/12 pm ET.

      Join top industry analysts and executives for an hour of innovative and groundbreaking insights about bold new ways to extend your machine identity protection. Hear directly from industry leaders who are excited about this new development, including:

      •Rich Baich, CISO, Wells Fargo
      •Andras Cser, Vice President and Principal Analyst, Forrester Research
      •Armon Dadgar, Co-founder and CTO, HashiCorp
      •Jeff Hudson, CEO, Venafi
      •John Morgan, GM, Security Business Unit, F5 Networks
      •Jake Reynolds, General Partner, TCV
      •Dan Timpson, CTO, DigiCert

      Venafi’s goal is to provide organizations the freedom to operate with confidence through secure communication and connections, with a high level of trust in their machine identities on their network. Please join this innovative and ground breaking discussion about Machine Identity Protection. Register now!

      Read more >
    • Authentication 2023: What Logging On Will Look Like 5 Years From Now
      Authentication 2023: What Logging On Will Look Like 5 Years From Now Jeff Carpenter, Director of Identity and Access Management Solutions, Crossmatch Recorded: Nov 14 2018 8:00 pm UTC 49 mins
    • Passwords are passé. Two-factor is cumbersome and unwieldy. The bad guys are relentless and cunning. Yet, the future of authentication has never looked brighter. With new advances in biometrics, behavioral, risk-based technology and AI, organizations are turning back the tide of breaches.

      In this session, IAM and biometric identity expert Jeff Carpenter looks at what authentication security looks like in the year 2023. How the act of merely approaching your PC or device will provide all the necessary behavioral, location and biometric data needed to successfully authenticate you. The trend toward more convenient, frictionless methods will continue to its logical conclusion. Learn how to get ready for this identity sea change.

      About the presenter:

      Jeff Carpenter is Director of Identity and Access Management solutions at Crossmatch, part of HID Global. He has held positions with top-tier cybersecurity and technology companies, most recently with RSA, a Dell Technologies company in 2017 before joining Crossmatch. Jeff has a passion for technology, passwords, biometrics and the future of enterprise authentication.

      He holds both a Certified Information Systems Security Professional (CISSP) and a Certified Cloud Security Professional (CCSP) designation.

      Read more >
    • Innovation in Identity & KYC: A Thought Leader Interview
      Innovation in Identity & KYC: A Thought Leader Interview Jodie Paula Cohen of ECN interviews Rob Laurence, Director of Innovate Identity Recorded: Mar 24 2016 10:00 am UTC 21 mins
    • Traditional methods of identity verification are contributing to lengthy and expensive KYC and onboarding processes. Technological advances, regulatory requirements and business necessity are leading organisations to a point where they have to rethink the way identity works.

      With so many financial services institutions embracing digital, the big challenge is bringing together information about each client, from multiple systems, to create one accurate client identity. Achieving this, while demonstrating robust and compliant KYC capabilities, is causing costs to spiral.

      In this exclusive webinar Jodie Paula Cohen, producer of the acclaimed Identity & KYC conference, catches up with leading Identity expert Rob Laurence, Director of Innovate Identity, to gain some practical insights into how these challenges can be tackled.

      Questions will include:

      1) How close are we to being able to access digital information about identity in a consumable and trusted way, across industries?

      2) Which technologies should organisations be looking into, to support their identity and KYC processes?

      3) Is the blockchain a complete solution for improved identity verification, or just part of a wider solution?

      4) How can institutions ensure a user-friendly and compliant KYC and onboarding process?

      5) What are the challenges and benefits of putting in place a ‘financial services passport’?

      Read more >