Accelerating Threat Detection with Real-Time Security Intelligence
Many organizations rely on governance, risk, and compliance (GRC) technology to consolidate risk information from internal sources (such as finance, IT, and operations) and external sources to understand their threat landscape. Yet as vendor ecosystems grow in size and complexity, risk management teams are increasingly struggling to procure and maintain high-quality, real-time data to feed their GRC systems.
Creating a threat intelligence strategy is essential for a company to identify and prioritize threats effectively. But when it comes time to choose threat intelligence services and products it can be hard to know where to start. In this webinar, our expert panel will discuss how to use real-time threat intelligence to accelerate threat detection, including how to:
• Understand the important distinction between threat data and intelligence.
• Establish what types of intelligence will prove beneficial to your organization and be critical for ROI.
• Ensure logging and reporting mechanisms are in place that can provide data per API to simplify forensic and compliance reporting.
• Gain complete visibility into all of your organization’s API traffic, and analyze relevant intelligence effectively from large volumes of threat data.
• Empower your teams to leverage automation to detect and block threats to your organization.
Moderated by Colin Whittaker and joined by the following panelists:
Teju Shyamsundar, Senior Product Marketing Manager, Okta
Francois Lascelles, Field CTO, Ping Identity
Allan Liska, Senior Security Architect, Recorded Future
Steve Ginty, Director of Threat Intelligence, RiskIQ
RecordedJan 7 202174 mins
Your place is confirmed, we'll send you email reminders
Frederico Hakamine, Group Product Marketing Manager, Okta
Whether organizations were ready or not, COVID-19 accelerated IT. With the rapid increase in remote work and digital business, tech leaders now need to future-proof their IT environments while ensuring management efficacy and security.
Join us as we discuss:
• The effects of the pandemic on organizations with complex hybrid IT and multi-cloud environments
• IT strategies for long-term success
Beth Barach, Director, Solutions Product Marketing, Okta and Tom Schmidt, Digital Content Director, IDG Communications, Inc.
Alongside the rise in remote work, there’s been a staggering increase in security threats, in particular account takeover (ATO) attacks. Even minor incidents can threaten monetary loss, chargebacks, regulatory fines, and reputation loss. Many organizations see the looming threat that ATO attacks pose to their business, but don’t understand the most important place to start for prevention: identity security.
Join this webinar with IDG and Okta, where you’ll learn:
• Why identity-focused security is a critical element in driving digital business
• Survey insights on global IT leaders’ identity and access management objectives, practices, and challenges
• The perceived threat of account takeover attacks and methods of prevention
Harold Jackson, Head of Global Analyst Relations, Slack and Wayne Kurtzman, Research Director, Social and Collaboration, IDC
As many organizations now support largely distributed workforces, leaders are looking at technological options to support employees' needs for collaboration and productivity while maintaining user security. IDC research shows that 47% of CEOs support moving more applications to the cloud to provide better security and availability.
Watch this webinar to:
• Discuss how remote work is redefining the workplace, and creating new opportunities for collaboration
• Explore the right mix of tools, security and governance required for today’s workforce, enabling employees to work from anywhere and with any device
• Learn how leveraging open APIs and flexible technologies not only delivers on employee expectations, but translates to real business value
Danielle Kucera, Sr. Product Marketing Manager, Okta and David Shackelford, Dir. of Product Management, Workflows, Okta
Join Okta to learn about Customer Identity Workflows functionality that recently launched, as well as what's planned for the future. We'll be covering new use cases, connectors, pricing, and platform improvements that will make your entire Okta Workflows experience better. We'll also be digging into the biggest learnings from our customers during our Early Adopter Program and what's in store for the near-term roadmap.
Identity is key to everything we do in a digital world: from online banking to your favorite streaming services to your workplace apps, it serves as the core of your interactions with digital systems. Decentralized identity puts control of that digital ID in the hands of the individual, replacing traditional identifiers like usernames with IDs that are self-owned and independent – but delivering on this promise is easier said than done.
In this session:
• We'll break down what decentralized identity is
• The potential technologies that can help deliver on it
• And the challenges that must be overcome to achieve it
Aaron Parecki, Security Architect Group Manager, Okta
In this session, Aaron Parecki, author of OAuth 2.0 Simplified and co-editor of the in-progress OAuth 2.1 spec, will cover the basics of the OAuth and OpenID Connect protocols. You’ll learn about when you’d want to use OAuth or OpenID Connect (or both!), when to use each of the grant types, and how to use OAuth and OpenID Connect securely from mobile applications. Aaron also covers the latest best practices around OAuth security currently in development by the group.
Additional session topics include:
• The upcoming OAuth 2.1 update and what it means for you and your applications
• How to use JWT access tokens and the tradeoffs that come with them
• How to design scopes that allow granular access to various parts of your backend services
• How to design a microservices architecture protected by OAuth at a gateway
Teju Shyamsundar, Group Product Marketing Manager, Okta
Let’s face it, we’re all tired of passwords. Memorizing passwords, using easy-to-guess passwords, and writing passwords down all lead to both a terrible end user experience, and a lack of security. That’s why Okta is excited to announce Okta FastPass – the first truly passwordless login experience across all devices. Okta FastPass finally helps us to do what we’ve always wanted to do with passwords—not use them.
In this webinar, you’ll see:
• How Okta FastPass works across Windows, MacOS, iOS, Android to deliver a passwordless login experience for end users
• The admin experience required to configure Okta FastPass
As businesses’ dependency on cloud and mobile technologies grows, traditional network boundaries and legacy identity and access management solutions are becoming increasingly redundant. With greater amounts of sensitive data in their hands, the need to secure businesses from potential breaches has never been more pressing.
Identity as a Service (IDaaS) describes any cloud-based service facilitating secure access to data - including single sign-on, authentication and access controls. With a number of different options to choose from, picking the right modern identity solution for your business in 2021 is no easy feat.
In the first episode of The Future of Identity Management, identity experts and Okta are diving deep into the world of IDaaS and looking at why identity has become such a prevalent issue for business leaders.
Join us to discover:
- What identity is, why it’s important, and how it’s evolved in recent years
- How IDaaS can help organizations meet their business goals
- What the main components of modern identity are
- Why businesses should invest in modern identity strategy
- What the future of identity looks like, including latest trends and innovations in IDaaS
Passwords have been a constant throughout the internet era. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources across the applications we use on a daily basis.
But in this new digital age where data breaches are rampant, passwords are no longer good enough. Not only are they insecure, they are expensive and offer a poor user experience. Fortunately, there’s a better way to protect your applications and stop account takeover incidents.
In this session, we’ll discuss:
• The benefits of passwordless authentication
• Explain how eliminating the password can help improve user experience, admin visibility and control, and scalability
• Key considerations and first steps as you embark on your passwordless journey
Teju Shyamsundar, Group Product Marketing Manager, Okta
Passwordless authentication is no longer a dream of the distant future. For consumers, everyday technologies such as Apple Face ID and Android Face Unlock allow users to access their devices password-free. And for the workforce, technologies like fingerprint readers, face recognition and mobile authenticator apps help to provide a passwordless experience.
Join this session with Okta experts where we’ll talk through:
• The deployment considerations when choosing a passwordless solution
• How to deliver a great end user experience while still meeting your business security requirements
• How to get started on your journey to passwordless
The influx of new devices types in the workplace has transformed how we work. Your employees need to stay productive on any device, from anywhere, at any time. But, this is easier said than done, as new devices could also mean increased vulnerabilities.
Today, IT and Security teams need to consider how to enable device visibility, enforce devices based access controls, secure access within applications, while still delivering seamless access experiences for employees.
Join in on this presentation to understand how to:
• Reduce data breaches with device strategies
• Enforce device-based security
• Integrate user and device-based risk in access policies
• Reduce dependencies on on-prem tools to manage your devices
While distributed workforces are a new model for many security organizations, Okta’s security teams have been enabling and securing a substantial remote and mobile workforce for years. Join leaders from Okta’s Security Team and special guests to learn how Okta has addressed the unique challenges created by this distributed working environment, including:
• Trends in security threats as a result of the COVID-19 pandemic
• Understanding the risk posed by vendors
• Protecting our people, including the extended workforce; contractors, partners and vendors
Chris Niggel, Sr. Director, Security & Compliance, Okta
Yogesh Badwe, Sr. Director, InfoSec Engineering, Okta
Vijay Rao, VP, People Operations, Okta
Sheel Patel, Director of Strategic Sourcing, Okta
The last few months have changed the way IT needs to operate.
On the one hand, organizations are dealing with urgent security threats from:
• New tools, such as video conferencing, which is now business critical
• Providing cloud access to all users for both cloud and on-premises apps
• The blurred lines between corporate devices and BYOD
• An explosion of phishing and spear-phishing attacks
At the same time, the massive economic changes require businesses to pivot. Think of the huge, almost overnight shift to curbside delivery and online ordering. Organizations' directory structures need to be able to handle quick moves to new cloud applications and other systems.
Attend this webcast to get a clear-eyed view of the stresses all these new requirements put on Azure AD, with its many dependencies on 20-year-old Active Directory technology. Get a sense of what Azure AD is doing well, and how Microsoft's technologies can be supplemented for maximum security and IT agility.
Armen Vartanian, SVP, Global Workplace Services, Okta and Chris Flynn, VP Employee Enablement, Okta
In light of the COVID-19 pandemic, Okta has accelerated its move to a dynamic work environment. This philosophy relies on a secure technology stack that enables collaboration and productivity, regardless of location.
In this webinar, Okta's Workplace and IT teams will discuss:
• The company's plans for dynamic work
• How technology plays a critical piece in securing and enabling this new paradigm
Kelsey Nelson, Senior Product Marketing Manager, Okta and Sami Laine, Director, Technology Strategy, Okta
The recent and rapid shift to distributed work has pushed the need for a modern, zero trust approach to security to the front of many IT and security leaders' agendas. Today, we can no longer have a network perimeter-centric view of security; instead, we need to securely enable access for all members of your workforce (employees, partners, contractors, collaborators) regardless of their location, device, or network.
In this webinar, we'll take a look at progress made when it comes to the identity foundation of zero trust. We'll discuss insights from a recent survey of 500 security leaders worldwide to see where organizations are currently having success, what's changed since last year, and what hurdles they plan to tackle next -- and explore the impact the recent crisis has had on those priorities as well.
Frederico Hakamine, Group Product Marketing Manager, Okta
As the COVID-19 outbreak drove people to shelter in place and businesses to work from home, IT and Security teams went above and beyond to quickly enable remote work with the resources readily available to them. The positive results deeply transformed how organizations see remote work as a strategic opportunity (the 'new normal') for the future of their business and create enormous pressure over the current IT technology and processes. In this presentation, Frederico Hakamine of Okta will walk through his top three tips to help IT and Security transition from emergency solutions to future-proof technology and process to support the new normal at scale.
The rapid shift to remote, distributed workforces has forced IT professionals to quickly support new/expanded ways of working. In addition to extending access to resources and enhancing security from more locations and devices, IT now is challenged with rethinking already time-intensive onboarding and offboarding processes. According to a recent survey of IT leaders, these manual efforts sap budgets and productivity, and increase your security gaps. Okta can help you reduce the burden on IT and provide more security.
In this webinar, we’ll talk about:
• The benefits of automating onboarding and offboarding
• How Okta Lifecycle Management can help streamline many of the manual processes that you likely have in place today.
Work from Anywhere: How leading CSOs are staying on top in today's threat landscape
The sudden shift to a remote workforce has forced all organizations to accelerate their digital transformation plans to enable remote collaboration, provide corporate access to data and applications from anywhere, and enable seamlessly digital sales and customer service.
Most organizations need to re-imagine their critical cloud infrastructure and security enablers to manage this shift at speed, without compromising business continuity and enabling resiliency.
Join us on a panel discussion with security leaders from CrowdStrike, Netskope, Okta, and Proofpoint on how they are navigating through the challenges that come with a predominantly remote workforce and share best practices they’ve learned and adopted.
The panel will cover:
• The biggest challenges these leaders have faced since the crisis first hit
• Trends in threats their organizations are seeing and how they are mitigating them
• Proactive measures business can take to prepare their architecture for remote work
Rafal M. Los, VP of Security Strategy, Lightstream
David Bradbury, CSO, Okta
Lucia Milica, CSO, Proofpoint
Lamont Orange, CISO, Netskope
Amol Kulkarni, CPO, Crowdstrike
The process of onboarding and offboarding users is tedious and complex. Many organizations still rely on manual provisioning processes, such as enabling and disabling accounts on an app-by-app basis, for every employee. As IT has evolved, they’ve developed custom scripts or code to automate the most simple and repetitive tasks, but these solutions are incomplete and only address a portion of apps. This also ties up precious development resources required to build and maintain integration code. What if there was a better way? Tune in to see how Okta Workflows can automate identity lifecycle management, without using code.
• The challenge of managing identity lifecycles
• Automating identity lifecycle management
• Okta Workflows demonstration
Reclaiming our Space: Exploring the Contributions of People of Color in Technology Past and Present
Have you ever heard of James West? How about Mark Dean? Probably not. Without James your phone wouldn’t have its microphone. Mark helped to develop the IBM PC, and holds one third of IBM’s original patents. When we talk about the development of technology, it’s rare that we discuss the past contributions from minorities or explore what it means for organizations such as Black Girls Code and other advocates who seek to create a more inclusive innovation space.
In this brand new talk, Kimberly Bryant, Founder and CEO of Black Girls CODE, traces the history of how minorities have shaped our technological culture and the importance of amplifying their innovations of the future.
Kimberly Bryant, Founder + CEO, Black Girls CODE