Hi [[ session.user.profile.firstName ]]

7 Common IAM Mistakes

Identity and Access Management (IAM) is a key factor in managing security: it helps manage access to applications and systems, but falls short when applying that same solution to enterprise data. How can you address the shortfalls – and get the most out of your IAM?
Recorded Dec 6 2018 48 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Adrian Pinderhughes
Presentation preview: 7 Common IAM Mistakes

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • 7 Common IAM Mistakes Recorded: Dec 6 2018 48 mins
    Adrian Pinderhughes
    Identity and Access Management (IAM) is a key factor in managing security: it helps manage access to applications and systems, but falls short when applying that same solution to enterprise data. How can you address the shortfalls – and get the most out of your IAM?
  • Data Theft Under the Radar Recorded: Dec 5 2018 28 mins
    Mo Abdullahi
    Online security can be a world of uncertainty: we’re facing a new wave of sophisticated threats, while still dealing with the same fundamental threats from decades ago (SQL injection, ransomware from the 80’s).
    Join Varonis experts for a virtual keynote that explores how security threats are evolving - and what we need to be especially conscious of in the modern era.
  • How GDPR Affects Data Protection in the US and Canada Recorded: Nov 14 2018 47 mins
    Rob Sobers
    Recorded webinar reviews the implication of GDPR on US and Canada.
  • How Varonis Helps with GDPR Recorded: Nov 1 2018 34 mins
    Ben Hollands
    Watch our webinar to see how Varonis maps to GDPR articles, and what we’ve learned from the first 100 days of the GPDR.
  • Secure Active Directory in 4 Steps Recorded: Oct 18 2018 36 mins
    David Philpotts
    Attend this session and you’ll learn 4 tried-and-true steps you can take to secure your Active Directory and learn how to spot & fix AD misconfigurations, identify, prevent, and investigate advanced AD attacks.
  • Troy Hunt Keynote: The Modern State of Insecurity Recorded: Oct 10 2018 60 mins
    Troy Hunt
    Troy Hunt, creator of “Have I been pwned”, gives a virtual keynote that explores how security threats are evolving - and what we need to be especially conscious of in the modern era.

    In this extraordinary virtual keynote, you’ll learn:

    Real world examples of both current and emerging threats
    How threats are evolving and where to put your focus
    How to stem the flow of data breaches and protect against malicious activity
  • How Varonis Helps with GDPR Recorded: Oct 2 2018 34 mins
    Ben Hollands
    See how Varonis maps to GDPR articles, and what we’ve learned from the first 100 days of the GPDR.
  • From Zero to Active Directory Hero Recorded: Oct 1 2018 49 mins
    Matt Radolec
    The most important question in security is, “Is my data safe?” The answer lies with your data, and, increasingly, with Active Directory.

    Active Directory holds what attackers need in order to access data - user account credentials - it’s the most critical component to a windows network, and one of the most challenging to defend.
  • Where Does CyberSecurity Preparedness Fall Short? Lessons from the DoJ Recorded: Sep 27 2018 73 mins
    John Carlin
    From the hack of SONY Entertainment, to Russian interference in the 2016 election, John Carlin led investigations into these breaches and was responsible for protecting the nation against terrorism, espionage, and cyber and other national security threats.

    John's days of chasing cyber-terrorists for the DOJ as Assistant Attorney General for National Security might be over, but he’s joining us to share an insider’s perspective on cyber threats in the public and private sector.

    Learn:
    Where cybersecurity preparedness falls short (public and private sector)
    Practical takeaways to meet the cybersecurity needs of C-Suite executives
    How to manage the evolving threat landscape - and what you can do to stay secure
  • How Security Teams Use Varonis Recorded: Sep 26 2018 58 mins
    Adrian Pinderhuges
    Want inside tips on how to get the most out of DatAlert?
    Join and learn how to use DatAlert through and through - from understanding the dashboard and user alerts to prioritizing your investigations.
  • Office 365 Security Best Practices Recorded: Sep 25 2018 53 mins
    Rob Sobers
    Office 365 is dominating the cloud, yet its native security lacks unified controls required to protect the billions of sensitive files that flow between internal storage and the cloud. Learn why cloud-centric security is not enough, where built-in Office 365 security features fall short and how to enhance Office 365 security with Varonis.
  • Varonis Security Overview & Demo Recorded: Sep 24 2018 46 mins
    Brian Vecci
    Varonis unified data security platform is engineered from the ground up to protect your data from insider threats and cyberattacks.
  • DatAlert Master Class Recorded: Sep 21 2018 64 mins
    Brian Vecci
    Learn how to use DatAlert through and through – from understanding the dashboard and user alerts to prioritizing your investigations.
  • Troy Hunt Keynote: The Modern State of Insecurity Recorded: Sep 7 2018 60 mins
    Troy Hunt
    Troy Hunt, creator of “Have I been pwned”, gives a virtual keynote that explores how security threats are evolving - and what we need to be especially conscious of in the modern era.

    In this extraordinary virtual keynote, you’ll learn:

    Real world examples of both current and emerging threats
    How threats are evolving and where to put your focus
    How to stem the flow of data breaches and protect against malicious activity
  • How Security Teams Use Varonis Recorded: Jun 20 2018 58 mins
    Adrian Pinderhuges
    Want inside tips on how to get the most out of DatAlert?
    Join and learn how to use DatAlert through and through - from understanding the dashboard and user alerts to prioritizing your investigations.
  • Where Does CyberSecurity Preparedness Fall Short? Lessons from the DoJ Recorded: May 9 2017 73 mins
    John Carlin
    From the hack of SONY Entertainment, to Russian interference in the 2016 election, John Carlin led investigations into these breaches and was responsible for protecting the nation against terrorism, espionage, and cyber and other national security threats.

    John's days of chasing cyber-terrorists for the DOJ as Assistant Attorney General for National Security might be over, but he’s joining us to share an insider’s perspective on cyber threats in the public and private sector.

    Learn:
    Where cybersecurity preparedness falls short (public and private sector)
    Practical takeaways to meet the cybersecurity needs of C-Suite executives
    How to manage the evolving threat landscape - and what you can do to stay secure
  • GDPR Is Coming - Are You Ready? Recorded: May 9 2017 34 mins
    William Priestly
    The GDPR is uniform law across the EU and beyond, with new
    requirements for documenting IT procedures, performing
    risk assessments, rules on breach notifications, and
    tighter data minimization – establishing a single law to
    enforce European data protection rules and regulation
    and the right to personal data protection.

    Watch our webinar & learn:
    The new requirements of the adopted GDPR
    How to address the challenges and implement the changes
    The consequences of non-compliance (and how to avoid them)
    How the Varonis DSP helps you meet these requirements.
  • Are You Prepared to Identify & Defend Against Ransomware? Recorded: Apr 21 2017 37 mins
    Mo Abdullahi
    Ransomware’s showing no signs of slowing down – and neither are we!

    We'll teach you about ransomware, how you can protect your data AND demonstrate why Varonis customers have some of the fastest response times in the industry.

    Attend our Webinar to discover:

    Warning signs of an impending ransomware attack
    The most recent ransomware threats (Cryptolocker & its variants, Zcrypt, Locky, and more)
    How Varonis customers:
    Use DatAlert to detect suspicious behavior and insider threats
    Stay up-to-date defending against the latest ransomware variants
    Discover which files were affected and how to recover quickly
  • 6 Steps to HIPAA Compliance & Ransomware Protection Recorded: Apr 6 2017 58 mins
    Kilian Englert
    Ransomware strains are targeting healthcare providers knowing they will pay to reduce life-threating downtime. Even if the data is restored, do you need to report it as a breach? Were you in violation of HIPAA data protection laws?

    Don’t put your reputation and patients at risk! Join our HIPAA expert as he outlines a compliance program that also protects against ransomware attacks.

    Our educational webinar focuses on:

    The anatomy of HIPAA including the final omnibus rule
    How to identify and protect ePHI
    The risks and penalties of non-compliance
    New strains of ransomware, including their behavior and entry methods
    A step-by-step plan for HIPAA compliance and ransomware defense
Your Data. Our Mission.
Varonis is a pioneer in data security and analytics, specializing in software for data security, governance, compliance, classification, and threat analytics.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 7 Common IAM Mistakes
  • Live at: Dec 6 2018 7:00 pm
  • Presented by: Adrian Pinderhughes
  • From:
Your email has been sent.
or close