Hi [[ session.user.profile.firstName ]]

Modern Identity Strategies for Today's Healthcare IT Realities

Healthcare IT leaders face market and regulation requirements to expand and modernize their digital strategies. Whether it is delivering applications and platforms to accommodate consumer-centric healthcare or fast paced M&A, successful IT leaders are focusing on initiatives that are meant to profoundly impact the healthcare value chain and reinvent operations.

Identity is central to this transformation.

In this session you will learn:

- How modern identity platforms help accelerate digital transformation
- How to improve and secure your patient, care giver & employee experience
- How Mount Sinai is developing technology to enable seamless and effective collaboration on patient care across several organizations
Recorded Nov 30 2016 57 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Deepesh Chandra, IT Director, Mount Sinai & Nadav Benbarak, Director of Product Marketing, Okta
Presentation preview: Modern Identity Strategies for Today's Healthcare IT Realities

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Protecting Privacy in an Identity-centric World Recorded: May 24 2019 43 mins
    Marc Rogers, Kurt Opsahi, Jon Callas, Sara-Jayne Terp, Joseph Menn
    2018 was yet another hallmark year of data breaches, and this time with them came along a new slew of consumer privacy problems. Amid the chaos looms a larger set of questions: what is our digital identity?

    Who is the custodian of that information? And what rights do we, as citizens of the digital globe, have? Companies today have a wealth of knowledge beyond identifying numbers like SSNs or credit card numbers that get at the crux of who we are as individuals, such as biometrics and behavior.

    So what needs to change when it comes to protecting the privacy of our most precious information – our identities?

    Marc Rogers Executive Director, Cybersecurity Strategy Okta
    Kurt Opsahl Deputy Executive Director General Counsel EFF
    Jon Callas Senior Technology Fellow ACLU
    Sara-Jayne Terp Data Scientist Bodacea Light Industries
    Joseph Menn Investigative Journalist Reuters
  • GDPR + Customer Identity: The Journey to Compliance Recorded: May 22 2019 39 mins
    Swaroop Sham, Senior Product Marketing Manager, Okta
    Consumer-facing enterprises have long been stewards of customer identity data, storing sensitive attributes ranging from a customer’s name, to credit card numbers and home addresses.

    But with the ever increasing number of data breaches, privacy concerns, and misuse of data, lawmakers are stepping in to arm data regulation with teeth. In the European Union, the General Data Protection Regulation (GDPR) was the first step taken to set a new standard for data privacy.

    In the race to become GDPR compliant, many companies have adopted manual processes for handling GDPR requirements such as customer requests for profile information and the right to be forgotten. As these organizations embark on the journey of continual data privacy compliance with more regulations being proposed and enacted, enterprises must take a second look at automating, securing and future-proofing their infrastructure.

    In this webinar, learn how a modern customer identity and access management (CIAM) solution can facilitate privacy compliance while reducing costs to support manual processes, improving the customer experience and making companies more secure.
  • The Modern Approach to Multi-Factor Authentication for Office 365 Users Recorded: Apr 12 2019 32 mins
    Teju Shyamsundar
    Migrating to Office 365 means housing your email and documents in the cloud. While this brings the huge benefits of not having to manage your own server infrastructure, it also brings on new challenges of needing to protect access to your corporate resources from any entry point.

    In this webinar, we'll discuss:

    -How an identity and access management solution helps secure your Office 365 deployment
    -The role of MFA in securing Office 365 weaknesses
    -Different MFA policies and balancing security with usability
  • Identity Management as the Key to IT Modernization Recorded: Apr 12 2019 18 mins
    Daniel Lu, Okta
    Enterprises are saddled with an IT architecture that has evolved organically over time. Mergers, acquisitions, changing priorities, new applications, services and platforms create a huge flux in IT infrastructure.

    With the adoption of cloud and a drive to a more distributed workforce, IT is tasked with securely managing more users, on more devices, in more locations, and accessing more applications. The demands on IT are compounding quickly. And, limited staffing and budgets mean IT is constantly being asked to do more with less. Major IT modernization initiatives are critical to business success, but each has its challenges.

    Listen to this webinar to hear about:
    • Migrating enterprise applications to the cloud
    • Centralizing users across identity silos
    • Automating IT Workflows
  • Zero Trust in Practice: Why Identity Drives Next Gen Access Recorded: Apr 12 2019 44 mins
    Nick Fisher, Ivan Dwyer, Okta
    Zero-Trust is quickly becoming the dominant security model for the cloud, shifting the perimeter from the network to the people and devices that make up a modern workforce. As a model with many moving parts, the immediate question is where to start?

    In this session we'll focus on:
    -The full Zero Trust reference architecture
    -The steps required to adopt a zero-trust model
    -Why Identity is the foundational layer from which to build contextual access controls
  • Build an Effective API Security Strategy Recorded: Apr 12 2019 21 mins
    Kevin Casey, Okta
    In the last few years, APIs have become fundamental to our teams, partners, and customers. While we’d like to believe it all happened as a carefully executed plan, much of it came about by a combination of foresight, luck, and success breeding success. Unfortunately, that’s not good enough anymore.

    Gartner predicts that by 2022, API abuses will be the most-frequent attack vector resulting in data breaches for enterprise applications. In this on-demand, we’ll reconsider our earliest assumptions and use the new understanding to bring our APIs out of the shadows and create an effective API security strategy to protect ourselves, our partners, and our customers.
  • Power Your Security Ecosystem to Prevent Against Data Breaches Recorded: Nov 13 2018 26 mins
    Teju Shyamsundar, Sr. Manager, Product Marketing, Okta
    It’s no secret that today’s employees are more mobile than ever, accessing your corporate resources from a myriad of devices, locations and networks. This has brought on a new shift in the IT paradigm which requires identity to act as the central control point in defining an enterprise security strategy.

    A dynamic identity and access management platform should be extensible and integrate with your existing detection and response tools, as well as give you flexible automation and orchestration in managing an end user’s lifecycle journey.

    Join us to learn how to:

    - Enhance your existing investments in security by providing a centralized identity and access management tool
    - How enterprises can protect against data breaches and common identity attacks
  • Cloud Security: Identity Attacks That Exploit Your Broken Authentication Recorded: Oct 24 2018 27 mins
    Teju Shyamsundar, Okta, Sr. Product Marketing Manager
    It’s no secret that today’s hackers are smarter than ever before - a motivated hacker can use a variety of different methods to steal passwords from unsuspecting users.

    While two-factor authentication solutions have been around for a while, they're no longer comprehensive enough to defend the new perimeter. Join us to learn the anatomy of common identity attacks, and how to keep hackers out of your organization.

    We’ll discuss:

    Identity attacks that exploit insecure methods of authentication
    How to add a smart layer of security over your critical apps, services, and devices
    What to look for in a multi-factor authentication solution

    Speaker: Teju Shyamsundar, Okta, Sr. Product Marketing Manager

    Bio: Teju is a Product Marketing Manager on Okta's product team, focusing on integrations across Okta's set of core products. She is responsible for driving the value of the integrations across not just Okta's products, but also integrations with the vendors that Okta partners with. Prior to Okta, Teju was a field engineer at Microsoft, focusing on getting customers setup with enterprise mobility deployments.
  • Data Breach Myths vs. Reality Recorded: Sep 18 2018 29 mins
    Sami Laine, Director of Product Marketing, Okta
    Data breaches can happen to any organization, so it's important to understand your organization's risk of a data breach. But where should you start your assessment? What practical and pragmatic steps can you take?

    In this presentation, we'll discuss the myths vs. the realities on how:

    - Breaches happen
    - The rapidly growing cloud and SaaS adoption changes the game for defenders
    - Identity-driven security can help reduce the probability of a breach happening to your organization

    About the presenter:

    Sami is a security professional with over 15 years of experience across the security spectrum helping large enterprises with card fraud, web-scale user authentication and risk management and cloud workload security. At Okta Sami is responsible for technical marketing of Okta security business. Previously Sami was Principal Technologist at CloudPassage and before that he ran RSA’s Americas Sales Engineering for their Fraud Prevention product lines.
  • The Power of Identity2: Delivering end-to-end Identity Access and Governance Recorded: Jul 12 2018 55 mins
    Ron Piovesan, Business Development, Okta Collin Perry, Director of SaaS Solutions, SailPoint
    With the demise of the traditional enterprise network security perimeter, enterprises are leveraging the power of identity to secure and control access to all applications, systems, and data. All this IT infrastructure is housed both on-premises and in the cloud, and must be accessed by authorized local and remote employees as well as a growing web of partners, contractors, and suppliers.

    Join us to learn how the Okta Identity Cloud coupled with SailPoint Identity Governance can help you securely and effectively authenticate, provision, and govern access to all applications and data across the hybrid cloud and on-premises enterprise.

    Join the two leaders in Identity for this informative webinar and learn how to:

    · Achieve unified access, control, and IT efficiency
    · Mitigate the risk of a security breach and enforce corporate and compliance policies
    · Provide seamless identity access and governance
  • How Identity Can Integrate Office 365 with HR and Security Systems Recorded: Jun 28 2018 53 mins
    Arun Desouza, CISO at Nexteer Automotive, Sibrina Subedar, Director, Product Marketing at Okta
    Over their 100-year history, Nexteer Automotive welcomed technology advancements and innovations. They continue this journey in the era of digital transformation to fuel productivity, efficiency and innovation.

    While modernizing IT led to automation and productivity gains it also significantly increased their attack surface in a time when cyber threats are all too common. The complexity of legacy infrastructure, on-prem apps, and adoption of cloud apps, produced a multitude of end-user entry points. This complicated both security and user lifecycle management.

    Join CISO Arun Desouza from Nexteer to learn how they used identity as the lynchpin to connect disparate systems and applications. He will discuss how they used identity management to:

    - Reduce reliance on servers and complex architecture requirements of AD FS and MIM while deploying O365 with Azure AD.
    - Improve user lifecycle management by provisioning employees into all on-prem and cloud apps using HR-as-a-Master.
    - Integrate identity with network security infrastructure to reduce breaches and gain immediate visibility to when and where threats take place.

    Don’t want to miss this opportunity to hear how Nexteer used identity architecture to connect everything and improve ease of use, scalability, automation and productivity.

    About the speakers:

    Arun Desouza is Chief Information Security & Privacy Officer at Nexteer Automotive Corporation. Previously, he served as CISO and Director, Strategic Planning and Information Security at Inergy Automotive Systems. Arun’s expertise includes security strategy, risk management, identity management, cloud and privacy.

    Sibrina Subedar is a Director of Product Marketing at Okta. She spent 12 years at Cisco in many roles including Customer Advocacy & Product Management and working across many technologies like routing, switching, security, VoIP. The following 3 years at NetApp she started with product management on security products.
  • Optimizing Identity Access Management in a Cloud-First World Recorded: Jun 14 2018 39 mins
    Nick Fisher, Group Manager, Product Marketing, Security, Okta Jervis Hui, Senior Product Marketing Manager, Netspoke
    As organizations move to the cloud and adopt productivity suites like Microsoft Office 365, they’re presented with new risks around user access and authentication, data security, and cloud threats.

    In this webinar, attendees will learn:

    - How Okta and Netskope provide additional security controls for your cloud deployments.
    - Hear about top use cases around identity management and cloud security.
  • The Evolution of Zero Trust Security: Next Gen Access Recorded: Jun 7 2018 28 mins
    Nick Fisher, Security Product Marketing at Okta
    As breaches fill the headlines, more organizations are adopting a Zero Trust security model and its key principle of "never trust, always verify." Modern implementations of this model are focusing on "Next Gen Access," where identity and authentication can greatly enhance your security posture with less complexity than network-based solutions.

    Join Nick Fisher of Okta where we’ll discuss how companies today are having success taking a Zero Trust approach to security.
  • "Yes" to Identity. "No" to Parrots. Recorded: Mar 15 2018 2 mins
    The Onion
    #BeforeOkta, Jim went to extreme lengths to keep up with IT requests.

    Learn more: okta.com
  • "BooBoo" Made Identity All Better Recorded: Mar 14 2018 1 min
    The Onion
    #BeforeOkta, Jess’ app got hacked. Twice.

    Learn more: okta.com
  • Want Security in the Cloud? Look to Identity First Recorded: Mar 13 2018 34 mins
    Krystal Wang, Senior Manager, Security Solutions Michael Paiko, Director, Product Marketing, Identity
    Cost savings, storage, ease of updates. The allure of the cloud is hard to ignore, with some reports citing over 90% of organizations using cloud services in some manner. But all the benefits of the cloud disappear if you can't keep your data and users safe. In a perimeter-less world, it's identity that becomes the heart of security. Join us to discover why modern security starts with identity first and how identity can help overcome cloud frustrations.
  • Accelerating Agency IT Modernization Recorded: Mar 8 2018 63 mins
    Dr. Ronald Ross, NIST, David Hogue, NSA, Joe Diamond, Okta
    The White House’s American Technology Council and Office of American Innovation on modernizing federal technology published specific recommendations to jumpstart a new wave of modernization efforts by accelerating cloud adoption, consolidating networks and prioritizing key applications for needed upgrades.

    In this webinar, originally hosted by i360Gov, leaders from government and industry provide an overview of current initiatives and solutions to the many IT modernization challenges agencies face, such as:

    - Maintenance that often requires immediate attention and runs the risk of breaking integrations and upgrades
    - Legacy solutions that are unable to properly communicate between on-premises, mobile, and the cloud
    - Citizen facing services not designed for today’s technology environment

    You will also learn about Identity, the hidden accelerator to IT modernization, and how by creating a single solution for identity, agencies can speed up digital and cloud programs.
  • Accelerating Your Digital Transformation with Better Identity Management Recorded: Mar 7 2018 61 mins
    Morgan Reed, State of Arizona, Nadav Benbarak, Okta, Bob Woolley, Center for Digital Government
    If you’re a government IT leader, you’re no doubt looking at how to help your agency transition from legacy systems, paper-based processes and inefficient use of employee time – all with an eye toward better serving citizens. An innovative cloud-based approach to identity management accelerates these digital transformation efforts, while saving money and strengthening security.

    Watch this webinar for an engaging discussion on how a cloud-based identity management portal can:
    - Speed up the deployment of new apps and services while simplifying integration
    - Boost employee productivity by expediting user provisioning and deprovisioning
    - Increase citizen satisfaction with your agency’s services by providing users with convenient and secure access to government services
  • Rethinking API Security Recorded: Mar 6 2018 31 mins
    Keith Casey, API Problem Solver,Okta
    While APIs created new ways to reach our customers, our development practices haven’t adapted accordingly. The principles which have served us well are insufficient when users can and will connect at any time from any location with any device while still demanding a smooth, consistent experience.

    Instead of hoping for the best or blindly applying the old processes, let’s go back to basics and the well-supported standards to build an experience that keeps our customers happy and still lets our team sleep at night. In this session, we’ll cover the foundations of developing, securing, and managing access to the critical APIs that drive our business.
  • Identity Architecture to Maximize Microsoft Technology Benefits Recorded: Mar 1 2018 46 mins
    Sibrina Subedar, Director of Product Marketing Teju Shyamsundar, Senior Technical Marketing Manager
    If your organization is in the middle of IT modernization, you know how frustrating it can be when legacy systems and modern cloud technologies and applications don’t get along. Choosing the right cloud Identity and access management architecture over a half baked “free” or “included” product can make a difference between a successful transition or another IT horror story.
    Join this webinar to learn about:
    - Architecting cloud identity solutions for the future: key decisions and common pitfalls
    - Benefits of using a modern cloud-based identity and access management platform for Office 365, Windows 10, On-Premises SharePoint, Intune, -
    - Dynamics, and more Microsoft applications
    - Advanced lifecycle management for Office 365 - with demo
The Identity Cloud
Millions of people rely on Okta every day to securely connect with the technologies and services that let them do their most important work.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Modern Identity Strategies for Today's Healthcare IT Realities
  • Live at: Nov 30 2016 6:00 pm
  • Presented by: Deepesh Chandra, IT Director, Mount Sinai & Nadav Benbarak, Director of Product Marketing, Okta
  • From:
Your email has been sent.
or close