How Identity Can Integrate Office 365 with HR and Security Systems
Over their 100-year history, Nexteer Automotive welcomed technology advancements and innovations. They continue this journey in the era of digital transformation to fuel productivity, efficiency and innovation.
While modernizing IT led to automation and productivity gains it also significantly increased their attack surface in a time when cyber threats are all too common. The complexity of legacy infrastructure, on-prem apps, and adoption of cloud apps, produced a multitude of end-user entry points. This complicated both security and user lifecycle management.
Join CISO Arun Desouza from Nexteer to learn how they used identity as the lynchpin to connect disparate systems and applications. He will discuss how they used identity management to:
- Reduce reliance on servers and complex architecture requirements of AD FS and MIM while deploying O365 with Azure AD.
- Improve user lifecycle management by provisioning employees into all on-prem and cloud apps using HR-as-a-Master.
- Integrate identity with network security infrastructure to reduce breaches and gain immediate visibility to when and where threats take place.
Don’t want to miss this opportunity to hear how Nexteer used identity architecture to connect everything and improve ease of use, scalability, automation and productivity.
About the speakers:
Arun Desouza is Chief Information Security & Privacy Officer at Nexteer Automotive Corporation. Previously, he served as CISO and Director, Strategic Planning and Information Security at Inergy Automotive Systems. Arun’s expertise includes security strategy, risk management, identity management, cloud and privacy.
Sibrina Subedar is a Director of Product Marketing at Okta. She spent 12 years at Cisco in many roles including Customer Advocacy & Product Management and working across many technologies like routing, switching, security, VoIP. The following 3 years at NetApp she started with product management on security products.
RecordedMay 13 202052 mins
Your place is confirmed, we'll send you email reminders
Building a modern app requires the perfect blend of technologies that enable scalability and security for your customers. Some organizations build these solutions themselves, spending a large amount of developer resources on security, authentication, authorization, and user management. But this approach can mean less time spent on an app’s core functionality. That’s why Okta’s Customer Identity offering is different. It enables developers to stay up-to-date with scalability and security needs out of the box, while still allowing for flexible customizations that directly address your organization’s needs.
Join this webinar to learn:
• How to reduce development time for your app’s digital experiences
• The components of a modern customer identity and access management solution
• How Okta can eliminate your app’s security gaps
Ryan Terry, Sr. Solutions Product Marketing Manager, Okta
With increasingly distributed workforces and the rise in identity-based attacks, identity has become the de facto perimeter for organizations today. Identity is the foundation of a zero trust architecture, as you need to ensure the right people have the right level of access, on the right device, to the right resource, in the right context. Learn how a comprehensive, identity-first security strategy can tie the complexities of protecting people and assets together in a seamless experience.
Zero Trust started a decade ago from realization that the traditional perimeter-centric security model had failed. But how does identity fit into that? What are the design principles and properties a solution should have? In this talk we discuss how we got here, and what the maturity model for Identity in Zero Trust looks like.
Frederico Hakamine, Group Product Marketing Manager, Okta
Whether organizations were ready or not, COVID-19 accelerated IT. With the rapid increase in remote work and digital business, tech leaders now need to future-proof their IT environments while ensuring management efficacy and security.
Join us as we discuss:
• The effects of the pandemic on organizations with complex hybrid IT and multi-cloud environments
• IT strategies for long-term success
Beth Barach, Director, Solutions Product Marketing, Okta and Tom Schmidt, Digital Content Director, IDG Communications, Inc.
Alongside the rise in remote work, there’s been a staggering increase in security threats, in particular account takeover (ATO) attacks. Even minor incidents can threaten monetary loss, chargebacks, regulatory fines, and reputation loss. Many organizations see the looming threat that ATO attacks pose to their business, but don’t understand the most important place to start for prevention: identity security.
Join this webinar with IDG and Okta, where you’ll learn:
• Why identity-focused security is a critical element in driving digital business
• Survey insights on global IT leaders’ identity and access management objectives, practices, and challenges
• The perceived threat of account takeover attacks and methods of prevention
Harold Jackson, Head of Global Analyst Relations, Slack and Wayne Kurtzman, Research Director, Social and Collaboration, IDC
As many organizations now support largely distributed workforces, leaders are looking at technological options to support employees' needs for collaboration and productivity while maintaining user security. IDC research shows that 47% of CEOs support moving more applications to the cloud to provide better security and availability.
Watch this webinar to:
• Discuss how remote work is redefining the workplace, and creating new opportunities for collaboration
• Explore the right mix of tools, security and governance required for today’s workforce, enabling employees to work from anywhere and with any device
• Learn how leveraging open APIs and flexible technologies not only delivers on employee expectations, but translates to real business value
Danielle Kucera, Sr. Product Marketing Manager, Okta and David Shackelford, Dir. of Product Management, Workflows, Okta
Join Okta to learn about Customer Identity Workflows functionality that recently launched, as well as what's planned for the future. We'll be covering new use cases, connectors, pricing, and platform improvements that will make your entire Okta Workflows experience better. We'll also be digging into the biggest learnings from our customers during our Early Adopter Program and what's in store for the near-term roadmap.
Identity is key to everything we do in a digital world: from online banking to your favorite streaming services to your workplace apps, it serves as the core of your interactions with digital systems. Decentralized identity puts control of that digital ID in the hands of the individual, replacing traditional identifiers like usernames with IDs that are self-owned and independent – but delivering on this promise is easier said than done.
In this session:
• We'll break down what decentralized identity is
• The potential technologies that can help deliver on it
• And the challenges that must be overcome to achieve it
Aaron Parecki, Security Architect Group Manager, Okta
In this session, Aaron Parecki, author of OAuth 2.0 Simplified and co-editor of the in-progress OAuth 2.1 spec, will cover the basics of the OAuth and OpenID Connect protocols. You’ll learn about when you’d want to use OAuth or OpenID Connect (or both!), when to use each of the grant types, and how to use OAuth and OpenID Connect securely from mobile applications. Aaron also covers the latest best practices around OAuth security currently in development by the group.
Additional session topics include:
• The upcoming OAuth 2.1 update and what it means for you and your applications
• How to use JWT access tokens and the tradeoffs that come with them
• How to design scopes that allow granular access to various parts of your backend services
• How to design a microservices architecture protected by OAuth at a gateway
Teju Shyamsundar, Group Product Marketing Manager, Okta
Let’s face it, we’re all tired of passwords. Memorizing passwords, using easy-to-guess passwords, and writing passwords down all lead to both a terrible end user experience, and a lack of security. That’s why Okta is excited to announce Okta FastPass – the first truly passwordless login experience across all devices. Okta FastPass finally helps us to do what we’ve always wanted to do with passwords—not use them.
In this webinar, you’ll see:
• How Okta FastPass works across Windows, MacOS, iOS, Android to deliver a passwordless login experience for end users
• The admin experience required to configure Okta FastPass
Diana Kelley - CTO, SecurityCurve | Dan Beckett - GM of Cybersecurity & Identity at Solliance | Doug Simmons - MD, TechVision
As businesses’ dependency on cloud and mobile technologies grows, traditional network boundaries and legacy identity and access management solutions are becoming increasingly redundant. With greater amounts of sensitive data in their hands, the need to secure businesses from potential breaches has never been more pressing.
Identity as a Service (IDaaS) describes any cloud-based service facilitating secure access to data - including single sign-on, authentication and access controls. With a number of different options to choose from, picking the right modern identity solution for your business in 2021 is no easy feat.
In the first episode of The Future of Identity Management, identity experts and Okta are diving deep into the world of IDaaS and looking at why identity has become such a prevalent issue for business leaders.
Join us to discover:
- What identity is, why it’s important, and how it’s evolved in recent years
- How IDaaS can help organizations meet their business goals
- What the main components of modern identity are
- Why businesses should invest in modern identity strategy
- What the future of identity looks like, including latest trends and innovations in IDaaS
Passwords have been a constant throughout the internet era. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources across the applications we use on a daily basis.
But in this new digital age where data breaches are rampant, passwords are no longer good enough. Not only are they insecure, they are expensive and offer a poor user experience. Fortunately, there’s a better way to protect your applications and stop account takeover incidents.
In this session, we’ll discuss:
• The benefits of passwordless authentication
• Explain how eliminating the password can help improve user experience, admin visibility and control, and scalability
• Key considerations and first steps as you embark on your passwordless journey
Teju Shyamsundar, Group Product Marketing Manager, Okta
Passwordless authentication is no longer a dream of the distant future. For consumers, everyday technologies such as Apple Face ID and Android Face Unlock allow users to access their devices password-free. And for the workforce, technologies like fingerprint readers, face recognition and mobile authenticator apps help to provide a passwordless experience.
Join this session with Okta experts where we’ll talk through:
• The deployment considerations when choosing a passwordless solution
• How to deliver a great end user experience while still meeting your business security requirements
• How to get started on your journey to passwordless
The influx of new devices types in the workplace has transformed how we work. Your employees need to stay productive on any device, from anywhere, at any time. But, this is easier said than done, as new devices could also mean increased vulnerabilities.
Today, IT and Security teams need to consider how to enable device visibility, enforce devices based access controls, secure access within applications, while still delivering seamless access experiences for employees.
Join in on this presentation to understand how to:
• Reduce data breaches with device strategies
• Enforce device-based security
• Integrate user and device-based risk in access policies
• Reduce dependencies on on-prem tools to manage your devices
While distributed workforces are a new model for many security organizations, Okta’s security teams have been enabling and securing a substantial remote and mobile workforce for years. Join leaders from Okta’s Security Team and special guests to learn how Okta has addressed the unique challenges created by this distributed working environment, including:
• Trends in security threats as a result of the COVID-19 pandemic
• Understanding the risk posed by vendors
• Protecting our people, including the extended workforce; contractors, partners and vendors
Chris Niggel, Sr. Director, Security & Compliance, Okta
Yogesh Badwe, Sr. Director, InfoSec Engineering, Okta
Vijay Rao, VP, People Operations, Okta
Sheel Patel, Director of Strategic Sourcing, Okta
The last few months have changed the way IT needs to operate.
On the one hand, organizations are dealing with urgent security threats from:
• New tools, such as video conferencing, which is now business critical
• Providing cloud access to all users for both cloud and on-premises apps
• The blurred lines between corporate devices and BYOD
• An explosion of phishing and spear-phishing attacks
At the same time, the massive economic changes require businesses to pivot. Think of the huge, almost overnight shift to curbside delivery and online ordering. Organizations' directory structures need to be able to handle quick moves to new cloud applications and other systems.
Attend this webcast to get a clear-eyed view of the stresses all these new requirements put on Azure AD, with its many dependencies on 20-year-old Active Directory technology. Get a sense of what Azure AD is doing well, and how Microsoft's technologies can be supplemented for maximum security and IT agility.
Armen Vartanian, SVP, Global Workplace Services, Okta and Chris Flynn, VP Employee Enablement, Okta
In light of the COVID-19 pandemic, Okta has accelerated its move to a dynamic work environment. This philosophy relies on a secure technology stack that enables collaboration and productivity, regardless of location.
In this webinar, Okta's Workplace and IT teams will discuss:
• The company's plans for dynamic work
• How technology plays a critical piece in securing and enabling this new paradigm
Kelsey Nelson, Senior Product Marketing Manager, Okta and Sami Laine, Director, Technology Strategy, Okta
The recent and rapid shift to distributed work has pushed the need for a modern, zero trust approach to security to the front of many IT and security leaders' agendas. Today, we can no longer have a network perimeter-centric view of security; instead, we need to securely enable access for all members of your workforce (employees, partners, contractors, collaborators) regardless of their location, device, or network.
In this webinar, we'll take a look at progress made when it comes to the identity foundation of zero trust. We'll discuss insights from a recent survey of 500 security leaders worldwide to see where organizations are currently having success, what's changed since last year, and what hurdles they plan to tackle next -- and explore the impact the recent crisis has had on those priorities as well.
Frederico Hakamine, Group Product Marketing Manager, Okta
As the COVID-19 outbreak drove people to shelter in place and businesses to work from home, IT and Security teams went above and beyond to quickly enable remote work with the resources readily available to them. The positive results deeply transformed how organizations see remote work as a strategic opportunity (the 'new normal') for the future of their business and create enormous pressure over the current IT technology and processes. In this presentation, Frederico Hakamine of Okta will walk through his top three tips to help IT and Security transition from emergency solutions to future-proof technology and process to support the new normal at scale.
The rapid shift to remote, distributed workforces has forced IT professionals to quickly support new/expanded ways of working. In addition to extending access to resources and enhancing security from more locations and devices, IT now is challenged with rethinking already time-intensive onboarding and offboarding processes. According to a recent survey of IT leaders, these manual efforts sap budgets and productivity, and increase your security gaps. Okta can help you reduce the burden on IT and provide more security.
In this webinar, we’ll talk about:
• The benefits of automating onboarding and offboarding
• How Okta Lifecycle Management can help streamline many of the manual processes that you likely have in place today.
How Identity Can Integrate Office 365 with HR and Security SystemsArun Desouza, CISO at Nexteer Automotive, Sibrina Subedar, Director, Product Marketing at Okta[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]52 mins