Hi [[ session.user.profile.firstName ]]

Data Breach Myths vs. Reality

Data breaches can happen to any organization, so it's important to understand your organization's risk of a data breach. But where should you start your assessment? What practical and pragmatic steps can you take?

In this presentation, we'll discuss the myths vs. the realities on how:

- Breaches happen
- The rapidly growing cloud and SaaS adoption changes the game for defenders
- Identity-driven security can help reduce the probability of a breach happening to your organization

About the presenter:

Sami is a security professional with over 15 years of experience across the security spectrum helping large enterprises with card fraud, web-scale user authentication and risk management and cloud workload security. At Okta Sami is responsible for technical marketing of Okta security business. Previously Sami was Principal Technologist at CloudPassage and before that he ran RSA’s Americas Sales Engineering for their Fraud Prevention product lines.
Recorded Sep 18 2018 29 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sami Laine, Director of Product Marketing, Okta
Presentation preview: Data Breach Myths vs. Reality

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Shift Identity Left - Enable Secure Velocity at Scale Jan 13 2021 5:00 pm UTC 31 mins
    Ivan Dwyer, Group Product Marketing Manager, Okta
    To keep up with the rapid pace of innovation, more and more organizations are adopting the cloud operating model via DevOps practices, building automation pipelines and managing infrastructure as code.

    The challenge is, how do you move fast WITHOUT breaking things! Automating the delivery of software and operations of cloud infrastructure is essential to keep up with the pace and scale of the business, but what about security?

    This talk will cover best practices for securing automated DevOps pipelines, and the key role identity plays to ensure the right guard rails are in place. With a modern approach to identity, security is no longer an afterthought, but rather part of the process, enabling velocity at scale without compromising your challenging compliance requirements.
  • Devices in the Enterprise – How to Balance Security and Productivity Jan 12 2021 5:00 pm UTC 34 mins
    Teju Shyamsundar, Senior Product Marketing Manager, Okta
    The influx of new devices types in the workplace has transformed how we work. Your employees need to stay productive on any device, from anywhere, at any time. But, this is easier said than done, as new devices could also mean increased vulnerabilities.

    Today, IT and Security teams need to consider how to enable device visibility, enforce devices based access controls, secure access within applications, while still delivering seamless access experiences for employees.

    Join in on this presentation to understand how to:
    • Reduce data breaches with device strategies
    • Enforce device-based security
    • Integrate user and device-based risk in access policies
    • Reduce dependencies on on-prem tools to manage your devices
  • Accelerating Threat Detection with Real-Time Security Intelligence Jan 7 2021 5:00 pm UTC 74 mins
    A Panel of Security Experts
    Many organizations rely on governance, risk, and compliance (GRC) technology to consolidate risk information from internal sources (such as finance, IT, and operations) and external sources to understand their threat landscape. Yet as vendor ecosystems grow in size and complexity, risk management teams are increasingly struggling to procure and maintain high-quality, real-time data to feed their GRC systems.

    Creating a threat intelligence strategy is essential for a company to identify and prioritize threats effectively. But when it comes time to choose threat intelligence services and products it can be hard to know where to start. In this webinar, our expert panel will discuss how to use real-time threat intelligence to accelerate threat detection, including how to:

    • Understand the important distinction between threat data and intelligence.
    • Establish what types of intelligence will prove beneficial to your organization and be critical for ROI.
    • Ensure logging and reporting mechanisms are in place that can provide data per API to simplify forensic and compliance reporting.
    • Gain complete visibility into all of your organization’s API traffic, and analyze relevant intelligence effectively from large volumes of threat data.
    • Empower your teams to leverage automation to detect and block threats to your organization.

    Moderated by Colin Whittaker and joined by the following panelists:
    Teju Shyamsundar, Senior Product Marketing Manager, Okta
    Francois Lascelles, Field CTO, Ping Identity
    Allan Liska, Senior Security Architect, Recorded Future
    Steve Ginty, Director of Threat Intelligence, RiskIQ
  • The Top-3 Tips for Securing Hybrid IT Dec 17 2020 5:00 pm UTC 31 mins
    Frederico Hakamine, Okta, Sr. Manager of Product Marketing, Okta
    Today, 69% of organizations run their apps in multiple cloud and on-prem environments. This creates an extensive Hybrid IT threat surface, with organizations struggling to consistently secure access consistently.

    In this webinar, we will explore the best practices for approaching and securing access to Hybrid IT. You will learn about:

    • How organizations should approach cloud and on-premise resources
    • The value and benefits of delivering security from a unified identity platform
    • The best practices for securing the Hybrid IT at scale
    • How all of this correlates to modern security frameworks like Zero Trust and BeyondCorp.
  • Adapt to Long-Term Remote Work with Adaptive Access Policies Dec 16 2020 5:00 pm UTC 46 mins
    Teju Shyamsundar, Senior Product Marketing Manager, Okta
    At this point companies have successfully implemented short-term remote work solutions, but are you prepared for the long term? One of the biggest challenges of a decentralized workforce is ensuring you empower employees with the tools they need to get their jobs done.

    Join this webinar to learn how to:
    • Mitigate remote access risks
    • Shift your security perimeter to protect access to all resources – from VPNs, to cloud and on-prem apps, to servers and APIs
    • Ensure employees stay productive remotely by securing access via multi-factor authentication, adaptive access policies, and other collaboration tools that you can integrate with Okta
  • The Global State of Zero Trust and Identity 2020 Dec 10 2020 5:00 pm UTC 36 mins
    Kelsey Nelson, Senior Product Marketing Manager, Okta and Sami Laine, Director, Technology Strategy, Okta
    The recent and rapid shift to distributed work has pushed the need for a modern, zero trust approach to security to the front of many IT and security leaders' agendas. Today, we can no longer have a network perimeter-centric view of security; instead, we need to securely enable access for all members of your workforce (employees, partners, contractors, collaborators) regardless of their location, device, or network.

    In this webinar, we'll take a look at progress made when it comes to the identity foundation of zero trust. We'll discuss insights from a recent survey of 500 security leaders worldwide to see where organizations are currently having success, what's changed since last year, and what hurdles they plan to tackle next -- and explore the impact the recent crisis has had on those priorities as well.
  • An Introduction to Cryptography for Developers Dec 3 2020 5:00 pm UTC 58 mins
    Randall Degges, Head of Evangelism, Okta
    Cryptography is often thought of as a scary topic, but it doesn't have to be. In this talk, you'll learn about different types of useful cryptography, how they work (without needing a Ph.D. in Mathematics), and how to immediately start applying these concepts in your projects.
  • Securing Your Remote Workforce with Okta and Palo Alto Networks Recorded: Nov 24 2020 52 mins
    Sami Laine, Director of Technology Strategy at Okta and Shankar Chandrasekhar, Field CTO at Palo Alto Networks
    Has your security posture kept pace with your rapidly growing remote workforce?

    Gain actionable insights to secure your remote employees from the industry leaders in identity and access management and cloud-delivered network security.

    Join Sami Laine, Director of Technology Strategy at Okta, and Shankar Chandrashekar, Field CTO Prisma Access and SaaS at Palo Alto Networks, to discover the network security challenges facing organizations with distributed or remote workforces and how you can address them.

    In this session, you’ll learn:
    • How to stay ahead of bad actors with a proactive security posture
    • How to streamline security management and maintain consistent security policies
    • How to enable seamless, secure remote access for your end users
    • How the priorities of CIOs and CISOs are changing with the transformation to large-scale remote work
  • A Beginner’s Guide to Building a Secure Website Recorded: Nov 19 2020 60 mins
    Aaron Parecki, Senior Security Architect, Okta
    Building a secure user login system for your web app from scratch can be a deceptively tricky job. The last thing you want to have to worry about is choosing the right password hashing algorithm or building a forgot password flow.

    This webinar will teach you how to easily add secure login to your web apps using Okta, so that you can save time and get right into building the core of your application.

    You'll learn:
    • The basics of how OAuth works
    • How to use OAuth to secure a web application
    • How to configure your OAuth server in Okta
    • How to use OpenID Connect and JWTs to learn the identity of users who signed in

    By the end of this session, you'll be able to:
    • Implement an OAuth client in your programming language of choice
    • Use OpenID Connect to get the logged-in user's name and email address
  • How Okta's IT + Workplace Teams Are Getting Ready for Dynamic Work Recorded: Oct 29 2020 34 mins
    Armen Vartanian, SVP, Global Workplace Services, Okta and Chris Flynn, VP, IT Employee Enablement, Okta
    In this webinar, Okta's Workplace and IT leaders will discuss the company's plans for Dynamic Work and how technology, including Okta, plays a critical piece in securing and enabling this new paradigm.
  • Learn How IT Leaders are Helping Remote Workforces Stay Connected Recorded: Oct 20 2020 50 mins
    IT leaders at Box, Slack, Zoom and Okta
    Learn How IT Leaders at Box, Slack, Zoom and Okta are Helping Remote Workforces Stay Connected

    In this panel discussion, learn how IT leaders at Box, Slack, Zoom and Okta are helping remote workforces stay connected. In this candid conversation, you'll learn:
    • How technology can help leaders be more agile and ensure business continuity in 2020.
    • How each of our company's experts are supporting an increasingly mobile and connected workforce with the right tools for their workforce.
    • Our own IT leaders’ personal experiences around how they are using technology to address new and evolving remote work challenges during this critical time.

    Presenters:
    Paul Chapman, CIO, Box
    Anisha Vaswani, Corporate CIO, Box
    Stephen Franchetti, VP of Business Technology, Slack
    Hector Aguilar, President of Technology, Okta
    Gary Sorrentino, CIO Advisor, Zoom
  • Automation in the New Normal: On/Offboarding Remote Workers Recorded: Oct 13 2020 24 mins
    Kelsey Nelson, Senior Product Marketing Manager, Okta
    The rapid shift to remote, distributed workforces has forced IT professionals to quickly support new/expanded ways of working. In addition to extending access to resources and enhancing security from more locations and devices, IT now is challenged with rethinking already time-intensive onboarding and offboarding processes. According to a recent survey of IT leaders, these manual efforts sap budgets and productivity, and increase your security gaps. Okta can help you reduce the burden on IT and provide more security. In this live webinar, we’ll talk about the benefits of automating onboarding and offboarding and how Okta Lifecycle Management can help streamline many of the manual processes that you likely have in place today.
  • 3 Tips to Bridge Workforce Security and Productivity Recorded: Oct 6 2020 21 mins
    Frederico Hakamine, Group Product Marketing Manager, Okta
    As the COVID-19 outbreak drove people to shelter in place and businesses to work from home, IT and Security teams went above and beyond to quickly enable remote work with the resources readily available to them. The positive results deeply transformed how organizations see remote work as a strategic opportunity (the 'new normal') for the future of their business and create enormous pressure over the current IT technology and processes. In this presentation, Frederico Hakamine of Okta will walk us through his top three tips to help IT and Security transition from emergency solutions to future-proof technology and process to support the new normal at scale.
  • A Modern Approach to MFA for Office 365 Users Recorded: Sep 23 2020 28 mins
    Teju Shyamsundar, Senior Product Marketing Manager, Okta
    Migrating to Office 365 means housing your email and documents in the cloud. While this brings the huge benefits of not having to manage your own server infrastructure, it also brings on new challenges of needing to protect access to your corporate resources from any entry point.

    In this webinar, we'll discuss:

    - How an identity and access management solution helps secure your Office 365 deployment
    - The role of MFA in securing Office 365 weaknesses
    - Different MFA policies and balancing security with usability
  • Advancing Digital Transformation in Healthcare Recorded: Sep 8 2020 63 mins
    Alex Hilton - CEO, Cloud Industry Forum | Andy Winiarski - Yubico | David McLeman - Ancoris | Max Faun - Okta
    To say Digital Transformation can be tricky for the healthcare industry is an understatement. Copious streams of data, numerous IT systems that require interoperability, hundreds of vendors and the need for better employee and patient experience has seen the healthcare sector fall short of the progress being made in banking, retail and manufacturing.

    But powered by the global health crisis of Covid-19, the importance of technology in the future of healthcare has never been more in the spotlight. Join us for episode 11 of Digital Transformation in Action, where we put DX and healthcare under the lens and discuss:

    - How to push forward Digital Transformation in healthcare with the right AI, RPA, data transformation and cyber security strategies
    - How emerging technologies are pushing a patient-first approach
    - Why the barriers to implementing a digital-first reality in healthcare are often not technological - but embracing a change of culture

    Host:
    Alex Hilton - CEO, Cloud Industry Forum

    Guests:
    Andy Winiarski - Senior Solutions Engineer, Yubico
    David McLeman - CEO, Ancoris
    Max Faun - Head of EMEA Consulting, Okta
  • A Rip Van Winkle Discussion of Identity Management with Okta + SailPoint Recorded: Aug 10 2020 48 mins
    Mark Settle, CIO, Okta and Darran Rolls, CTO and CISO, Sailpoint
    Identity has never been more important. From yesterday’s legacy solutions to today's sprawling hybrid IT environment, centralizing and automating identity access, security and governance is a challenge. A modern, identity-aware infrastructure is essential for today’s enterprise to proactively address current and future security risks and compliance needs, while effectively meeting the evolving strategic needs of the business.

    You invested in your current identity solution to strengthen security and improve operational efficiency, but is your current solution able to address the evolving needs of your business?

    Tune into the webinar featuring Darran Rolls, SailPoint CTO and Mark Settle, Okta CIO to discover:

    - How to future-proof your security infrastructure with identity access and governance.
    - Best practices to improve end user productivity, strengthen compliance and security, and reduce IT and helpdesk operational costs.
    - Industry trends and how modern identity access and governance solutions will evolve.
  • Government Telework, Teamwork, & Security in 2020 Recorded: Aug 5 2020 61 mins
    Nick Ward, CISO, U.S. Dept. of Justice and Kelsey Nelson, Senior Manager of Product Solutions, Okta
    2020 marks the start of a new era in government IT. Even compared to a few months ago, the governments’ operational needs and security priorities have undergone a paradigm shift. Federal, State, and Local government IT leaders are quickly scaling work from home support to unprecedented levels, despite many organizations lacking needed infrastructure and security controls for a perimeterless work environment.

    Join government and industry experts to discuss how agencies are adapting to the changing environment to meet the needs of the immediate crisis. Equally important, we’ll ask how these circumstances can inspire long-term change in how employees, partners, and contractors to securely connect.

    Our live panel will discuss:

    - Security: Scaling agency remote workforces
    - Access: Delivering access on-prem and in the cloud and keep the environment secure with VPN enhancements or alternatives
    - Collaboration: Improving agency collaboration across shared resources
  • Modernizing Citizen Experiences with Cloud Identity Recorded: Aug 5 2020 43 mins
    Habib Hourani, Team Lead - Sr Solutions Engineer, Okta and Keith Casey, Group Manager Product Marketing, Okta
    The explosion of devices and communication channels in recent years presents government with a serious dilemma: How do agencies interact with citizens who increasingly rely on smartphones and tablets for public services?

    Citizens expect government agencies to meet them on their terms, and today that means a quality customer experience (CX) that’s digital, seamless and unfolds on any channel, device or platform they choose. More importantly, customers also expect their business with agencies to be private and secure. Agencies that can’t meet these demands risk losing citizens’ confidence and trust, but developing secure, frictionless CX is easier said than done.

    Fortunately, modern, cloud customer identity and access management (CIAM) can help improve the citizen experience and build trust in your solution. Attendees joined Okta for a live webinar to explore how agencies can strengthen their CIAM strategy.
  • Strategies to Work from Anywhere Recorded: Aug 5 2020 11 mins
    Kelsey Nelson, Senior Product Marketing Manager, Okta
    Many organizations have plans to support some level of a remote workforce, but, as we’re discovering, these plans didn’t often include essentially abandoning on-premises environments and pushing the entire workforce into remote offices and homes basically overnight. Even as companies shut down their facilities, IT pros are working overtime to figure out how best to support this shifting paradigm.

    In this webinar you'll learn:
    - How to get your work from home environment underway or expanded
    - Where you may have holes in your current policies and technologies
    - Ways to help accelerate and secure your deployments
  • Oktane20: Path to Continuous: Solving the Best of Breed Problem Recorded: Aug 5 2020 47 mins
    Karl McGuinness, Chief Product Architect, Okta
    A lot has changed since organizations first adopted federated identity-based solutions. Applications, data, and IT resources have moved outside the corporate network to IaaS, PaaS, and SaaS based solutions, each acting as its own resource domain with policies, authorization models, and sessions. Organizations are rethinking their identity and security architectures to address the shrinking perimeter based on zero trust principles.

    While we have modernized some of the key standards and protocols with OpenID Connect and SCIM, we haven’t really revisited the core IdP/SP relationship to address the needs of the modernize enterprise, including solving challenges like continuous auth in a best of breed world. In this session, we’ll explore the challenges and opportunities for a modern identity and access control plane is a cloud and mobile-first world.
The Identity Cloud
Millions of people rely on Okta every day to securely connect with the technologies and services that let them do their most important work.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Data Breach Myths vs. Reality
  • Live at: Sep 18 2018 8:00 pm
  • Presented by: Sami Laine, Director of Product Marketing, Okta
  • From:
Your email has been sent.
or close