Identity Management as the Key to IT Modernization
Enterprises are saddled with an IT architecture that has evolved organically over time. Mergers, acquisitions, changing priorities, new applications, services and platforms create a huge flux in IT infrastructure.
With the adoption of cloud and a drive to a more distributed workforce, IT is tasked with securely managing more users, on more devices, in more locations, and accessing more applications. The demands on IT are compounding quickly. And, limited staffing and budgets mean IT is constantly being asked to do more with less. Major IT modernization initiatives are critical to business success, but each has its challenges.
Listen to this webinar to hear about:
• Migrating enterprise applications to the cloud
• Centralizing users across identity silos
• Automating IT Workflows
RecordedMay 12 202017 mins
Your place is confirmed, we'll send you email reminders
Swaroop Sham, Okta, Sr. Manager of Product Marketing, Okta
Want to eliminate passwords? We all do. WebAuthn is a new web standard published by the World Wide Web Consortium (W3C) for users in the era of passwordless authentication for web applications. This new standard offers strong authenticators such as Touch ID or Face ID directly from your browser to keep attackers out while delivering first-class authentication experiences.
Watch this webinar to learn about:
• Use cases: Understand how the new standard enables low friction, phishing-resistant authentication
• Technology: Peak beneath the hood and see the core technical concepts that comprise WebAuthn
• User experience: Look at the user registration and authentication flows
• Business impact: WebAuthn helps security and product forge mutually aligned objectives
In the last decade, APIs have become fundamental to our teams, partners, and customers. While we’d like to believe it all happened as a carefully executed plan, let’s be honest… there’s as much luck as foresight in the mix. Luckily, success drives success so we’ve seen things explode in great ways. Unfortunately, that very success has cost us too.
APIs are becoming a consistent and devastating attack vector for applications that store everything from financial records to passport information to what you’re looking for in a date. In this session, we’ll reconsider some of our earliest assumptions and lay out some strategies for bringing our APIs out of the shadows and protecting ourselves, our partners, and our customers.
To keep up with the rapid pace of innovation, more and more organizations are adopting the cloud operating model via DevOps practices, building automation pipelines and managing infrastructure as code.
The challenge is, how do you move fast WITHOUT breaking things! Automating the delivery of software and operations of cloud infrastructure is essential to keep up with the pace and scale of the business, but what about security?
This talk will cover best practices for securing automated DevOps pipelines, and the key role identity plays to ensure the right guard rails are in place. With a modern approach to identity, security is no longer an afterthought, but rather part of the process, enabling velocity at scale without compromising your challenging compliance requirements.
The influx of new devices types in the workplace has transformed how we work. Your employees need to stay productive on any device, from anywhere, at any time. But, this is easier said than done, as new devices could also mean increased vulnerabilities.
Today, IT and Security teams need to consider how to enable device visibility, enforce devices based access controls, secure access within applications, while still delivering seamless access experiences for employees.
Join in on this presentation to understand how to:
• Reduce data breaches with device strategies
• Enforce device-based security
• Integrate user and device-based risk in access policies
• Reduce dependencies on on-prem tools to manage your devices
Many organizations rely on governance, risk, and compliance (GRC) technology to consolidate risk information from internal sources (such as finance, IT, and operations) and external sources to understand their threat landscape. Yet as vendor ecosystems grow in size and complexity, risk management teams are increasingly struggling to procure and maintain high-quality, real-time data to feed their GRC systems.
Creating a threat intelligence strategy is essential for a company to identify and prioritize threats effectively. But when it comes time to choose threat intelligence services and products it can be hard to know where to start. In this webinar, our expert panel will discuss how to use real-time threat intelligence to accelerate threat detection, including how to:
• Understand the important distinction between threat data and intelligence.
• Establish what types of intelligence will prove beneficial to your organization and be critical for ROI.
• Ensure logging and reporting mechanisms are in place that can provide data per API to simplify forensic and compliance reporting.
• Gain complete visibility into all of your organization’s API traffic, and analyze relevant intelligence effectively from large volumes of threat data.
• Empower your teams to leverage automation to detect and block threats to your organization.
Moderated by Colin Whittaker and joined by the following panelists:
Teju Shyamsundar, Senior Product Marketing Manager, Okta
Francois Lascelles, Field CTO, Ping Identity
Allan Liska, Senior Security Architect, Recorded Future
Steve Ginty, Director of Threat Intelligence, RiskIQ
Building a modern app requires the perfect blend of technologies that enable scalability and security for your customers. Some organizations build these solutions themselves, spending a large amount of developer resources on security, authentication, authorization, and user management. But this approach can mean less time spent on an app’s core functionality. That’s why Okta’s Customer Identity offering is different. It enables developers to stay up-to-date with scalability and security needs out of the box, while still allowing for flexible customizations that directly address your organization’s needs.
Join this webinar to learn:
• How to reduce development time for your app’s digital experiences
• The components of a modern customer identity and access management solution
• How Okta can eliminate your app’s security gaps
Passwords have been a constant throughout the internet era. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources across the applications we use on a daily basis.
But in this new digital age where data breaches are rampant, passwords are no longer good enough. Not only are they insecure, they are expensive and offer a poor user experience. Fortunately, there’s a better way to protect your applications and stop account takeover incidents.
In this session, we’ll discuss the benefits of passwordless authentication and explain how eliminating the password can help improve security, user experience, admin visibility and control, and scalability. We’ll also walk through key considerations as you embark on your passwordless journey.
Frederico Hakamine, Okta, Sr. Manager of Product Marketing, Okta
Today, 69% of organizations run their apps in multiple cloud and on-prem environments. This creates an extensive Hybrid IT threat surface, with organizations struggling to consistently secure access consistently.
In this webinar, we will explore the best practices for approaching and securing access to Hybrid IT. You will learn about:
• How organizations should approach cloud and on-premise resources
• The value and benefits of delivering security from a unified identity platform
• The best practices for securing the Hybrid IT at scale
• How all of this correlates to modern security frameworks like Zero Trust and BeyondCorp.
At this point companies have successfully implemented short-term remote work solutions, but are you prepared for the long term? One of the biggest challenges of a decentralized workforce is ensuring you empower employees with the tools they need to get their jobs done.
Join this webinar to learn how to:
• Mitigate remote access risks
• Shift your security perimeter to protect access to all resources – from VPNs, to cloud and on-prem apps, to servers and APIs
• Ensure employees stay productive remotely by securing access via multi-factor authentication, adaptive access policies, and other collaboration tools that you can integrate with Okta
Kelsey Nelson, Senior Product Marketing Manager, Okta and Sami Laine, Director, Technology Strategy, Okta
The recent and rapid shift to distributed work has pushed the need for a modern, zero trust approach to security to the front of many IT and security leaders' agendas. Today, we can no longer have a network perimeter-centric view of security; instead, we need to securely enable access for all members of your workforce (employees, partners, contractors, collaborators) regardless of their location, device, or network.
In this webinar, we'll take a look at progress made when it comes to the identity foundation of zero trust. We'll discuss insights from a recent survey of 500 security leaders worldwide to see where organizations are currently having success, what's changed since last year, and what hurdles they plan to tackle next -- and explore the impact the recent crisis has had on those priorities as well.
Cryptography is often thought of as a scary topic, but it doesn't have to be. In this talk, you'll learn about different types of useful cryptography, how they work (without needing a Ph.D. in Mathematics), and how to immediately start applying these concepts in your projects.
Sami Laine, Director of Technology Strategy at Okta and Shankar Chandrasekhar, Field CTO at Palo Alto Networks
Has your security posture kept pace with your rapidly growing remote workforce?
Gain actionable insights to secure your remote employees from the industry leaders in identity and access management and cloud-delivered network security.
Join Sami Laine, Director of Technology Strategy at Okta, and Shankar Chandrashekar, Field CTO Prisma Access and SaaS at Palo Alto Networks, to discover the network security challenges facing organizations with distributed or remote workforces and how you can address them.
In this session, you’ll learn:
• How to stay ahead of bad actors with a proactive security posture
• How to streamline security management and maintain consistent security policies
• How to enable seamless, secure remote access for your end users
• How the priorities of CIOs and CISOs are changing with the transformation to large-scale remote work
Building a secure user login system for your web app from scratch can be a deceptively tricky job. The last thing you want to have to worry about is choosing the right password hashing algorithm or building a forgot password flow.
This webinar will teach you how to easily add secure login to your web apps using Okta, so that you can save time and get right into building the core of your application.
You'll learn:
• The basics of how OAuth works
• How to use OAuth to secure a web application
• How to configure your OAuth server in Okta
• How to use OpenID Connect and JWTs to learn the identity of users who signed in
By the end of this session, you'll be able to:
• Implement an OAuth client in your programming language of choice
• Use OpenID Connect to get the logged-in user's name and email address
Armen Vartanian, SVP, Global Workplace Services, Okta and Chris Flynn, VP, IT Employee Enablement, Okta
In this webinar, Okta's Workplace and IT leaders will discuss the company's plans for Dynamic Work and how technology, including Okta, plays a critical piece in securing and enabling this new paradigm.
Learn How IT Leaders at Box, Slack, Zoom and Okta are Helping Remote Workforces Stay Connected
In this panel discussion, learn how IT leaders at Box, Slack, Zoom and Okta are helping remote workforces stay connected. In this candid conversation, you'll learn:
• How technology can help leaders be more agile and ensure business continuity in 2020.
• How each of our company's experts are supporting an increasingly mobile and connected workforce with the right tools for their workforce.
• Our own IT leaders’ personal experiences around how they are using technology to address new and evolving remote work challenges during this critical time.
Presenters:
Paul Chapman, CIO, Box
Anisha Vaswani, Corporate CIO, Box
Stephen Franchetti, VP of Business Technology, Slack
Hector Aguilar, President of Technology, Okta
Gary Sorrentino, CIO Advisor, Zoom
The rapid shift to remote, distributed workforces has forced IT professionals to quickly support new/expanded ways of working. In addition to extending access to resources and enhancing security from more locations and devices, IT now is challenged with rethinking already time-intensive onboarding and offboarding processes. According to a recent survey of IT leaders, these manual efforts sap budgets and productivity, and increase your security gaps. Okta can help you reduce the burden on IT and provide more security. In this live webinar, we’ll talk about the benefits of automating onboarding and offboarding and how Okta Lifecycle Management can help streamline many of the manual processes that you likely have in place today.
Frederico Hakamine, Group Product Marketing Manager, Okta
As the COVID-19 outbreak drove people to shelter in place and businesses to work from home, IT and Security teams went above and beyond to quickly enable remote work with the resources readily available to them. The positive results deeply transformed how organizations see remote work as a strategic opportunity (the 'new normal') for the future of their business and create enormous pressure over the current IT technology and processes. In this presentation, Frederico Hakamine of Okta will walk us through his top three tips to help IT and Security transition from emergency solutions to future-proof technology and process to support the new normal at scale.
Migrating to Office 365 means housing your email and documents in the cloud. While this brings the huge benefits of not having to manage your own server infrastructure, it also brings on new challenges of needing to protect access to your corporate resources from any entry point.
In this webinar, we'll discuss:
- How an identity and access management solution helps secure your Office 365 deployment
- The role of MFA in securing Office 365 weaknesses
- Different MFA policies and balancing security with usability
Alex Hilton - CEO, Cloud Industry Forum | Andy Winiarski - Yubico | David McLeman - Ancoris | Max Faun - Okta
To say Digital Transformation can be tricky for the healthcare industry is an understatement. Copious streams of data, numerous IT systems that require interoperability, hundreds of vendors and the need for better employee and patient experience has seen the healthcare sector fall short of the progress being made in banking, retail and manufacturing.
But powered by the global health crisis of Covid-19, the importance of technology in the future of healthcare has never been more in the spotlight. Join us for episode 11 of Digital Transformation in Action, where we put DX and healthcare under the lens and discuss:
- How to push forward Digital Transformation in healthcare with the right AI, RPA, data transformation and cyber security strategies
- How emerging technologies are pushing a patient-first approach
- Why the barriers to implementing a digital-first reality in healthcare are often not technological - but embracing a change of culture
Host:
Alex Hilton - CEO, Cloud Industry Forum
Guests:
Andy Winiarski - Senior Solutions Engineer, Yubico
David McLeman - CEO, Ancoris
Max Faun - Head of EMEA Consulting, Okta
Mark Settle, CIO, Okta and Darran Rolls, CTO and CISO, Sailpoint
Identity has never been more important. From yesterday’s legacy solutions to today's sprawling hybrid IT environment, centralizing and automating identity access, security and governance is a challenge. A modern, identity-aware infrastructure is essential for today’s enterprise to proactively address current and future security risks and compliance needs, while effectively meeting the evolving strategic needs of the business.
You invested in your current identity solution to strengthen security and improve operational efficiency, but is your current solution able to address the evolving needs of your business?
Tune into the webinar featuring Darran Rolls, SailPoint CTO and Mark Settle, Okta CIO to discover:
- How to future-proof your security infrastructure with identity access and governance.
- Best practices to improve end user productivity, strengthen compliance and security, and reduce IT and helpdesk operational costs.
- Industry trends and how modern identity access and governance solutions will evolve.