Hi [[ session.user.profile.firstName ]]

How to Scale Passwordless Within The Global Enterprise

Data continues to show that passwords remain the biggest security blind spot for enterprises today. Advances in mobile technology and security standards have provided organizations with strong authentication capabilities to minimize password risk. However, with the shift to remote work accelerating, the employee experience and productivity are more important than ever, and passwordless initiatives are becoming a priority for organizations of all sizes.

Join Ping and Yubico for ideas on how enterprises can work towards implementing passwordless at scale. Topics we will discuss are:
- The different passwordless scenarios
- Practical steps that you can take today
- Latest advancements in technology such as YubiKeys and FIDO
We will share experience gained from real-world implementations across our enterprise base and demonstrate why now is the time to get started on your passwordless journey.
Recorded Jul 21 2020 28 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Wes Dunnington, Field CTO (Ping Identity, Karen Larson, Director Strategic Integrations (Yubico)
Presentation preview: How to Scale Passwordless Within The Global Enterprise

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Five steps to stronger MFA for the new work-from-anywhere reality Oct 15 2020 5:00 pm UTC 45 mins
    Jerome Becquart (Axiad), Percy Wadia (Yubico)
    Remote work became the new normal in 2020. Looking ahead to 2021, organizations need better, more efficient ways to adapt to this new reality and secure teams working remotely and at the office. Enabling multi-factor authentication (MFA) across all business apps is a proven security best practice. However, getting the gold standard of authentication in the form of hardware authentication keys out to widely dispersed global teams presents new challenges.
    YubiEnterprise Delivery, Yubico’s new service for distributing YubiKeys globally to end-users, combined with Axiad Cloud, the smart, secure and simple access management platform, helps organizations easily manage YubiKeys to enhance security for the entire workforce.

    Learn five actionable steps to:
    -Improve your security posture, so you can effectively protect users, applications, machines, and systems throughout your entire digital ecosystem at scale
    -Streamline your operational processes, so you can focus more on your core business and less on the end-to-end distribution and deployment of hardware security keys

    Confidentiality and Data Processing:
    The information you provide in this form will be held in accordance with applicable privacy laws by Yubico, Inc., its Affiliates, and Axiad, Inc. for their performance of this webinar, and as such, you agree to being contacted and receiving relevant marketing materials. “Affiliate” means an entity that, directly or indirectly, controls, is controlled by, or is under common control with Yubico, Inc.

    Your personal data is retained by Yubico only as needed in accordance with Yubico data retention practices. The Yubico Privacy Notice offers more information about Yubico privacy practices, including the lawful basis for processing of personal data, how to lodge a complaint with the supervisory authority, and how to contact Yubico to exercise your data subject rights.

    Please refer to Axiad Inc’s own privacy policy for more information about their privacy practices.
  • CMMC: Recommendations to navigate the new Cyber Certification requirements Recorded: Sep 30 2020 60 mins
    Jeff Phillips(Yubico) Gregory Abrenio(Cyber Armed) Jeremy Haynes(ID.me) Dr. Chris Edwards(Intercede)
    Join Cyber Armed, ID.me, Intercede, and Yubico for a roundtable on key recommendations to navigate and get started with Cybersecurity Maturity Model Certification (CMMC).

    Defense Industrial Base (DIB) partners and contractors need to meet the Department of Defense’s (DOD) new CMMC to bid on future procurement, but what does CMMC compliance entail?

    The roundtable will focus on:
    1. CMMC levels and domains to pay attention to in relation to Identity and Access Management, including Access Controls and Privileged Access
    2. Steps to take to adapt current projects and practices to meet specific CMMC level compliance

    Confidentiality and Data Processing:
    The information you provide in this form will be held in accordance with applicable privacy laws by Yubico, Inc., its Affiliates, and its Works with YubiKey partners: Cyber Armed Security, ID.me, Inc., and Intercede Ltd. Any personal information submitted in this form will be used by Yubico, Inc., its Affiliates, Cyber Armed Security, ID.me, Inc., and Intercede Ltd for their performance of this webinar, and as such, you agree to being contacted and receiving relevant marketing materials. “Affiliate” means an entity that, directly or indirectly, controls, is controlled by, or is under common control with Yubico, Inc.

    Your personal data is retained by Yubico only as needed in accordance with Yubico data retention practices. Works with YubiKey partners will retain your personal data only as needed and in accordance with the respective data retention practices of each Works with YubiKey partner. The Yubico Privacy Notice offers more information about Yubico privacy practices, including the lawful basis for processing of personal data, how to lodge a complaint with the supervisory authority, and how to contact Yubico to exercise your data subject rights.

    Please refer to the respective privacy policies of the listed companies for more information about their privacy practices.
  • Protect Remote Workers Against Account Takeovers Recorded: Sep 23 2020 49 mins
    Abby Guha, Sr. Director, Product Marketing, Yubico
    Securing cloud applications and services with strong authentication

    Covid-19 quickly, and in many instances, drastically changed the way your employees work—creating a dependence on the cloud like never before. While workloads are much easier to scale and manage in the cloud than more traditional on-premises solutions, it introduces additional risks.

    With the rapid expansion of remote workers, across all types of organizations and industries, comes the requirement to secure their overall environments and workflows. Sensitive data that may have been accessed securely in tightly controlled office environments is now likely being accessed via less secure and shared home networks and devices.

    While employees may not be as diligent about security while from home, the sophistication of phishing attacks and other forms of account takeovers continues to rise. With data being stored and transmitted outside corporate networks, strong authentication should be considered essential to verify user identities before they can access sensitive information in the cloud.

    Attend this webinar to learn:
    - How to secure remote workers as they navigate work in the cloud
    - Why MFA should be a top requirement for supporting a distributed workforce
    - Best practices for securing remote workers against phishing and other cyber attacks
  • Meet the YubiKey 5C NFC Recorded: Sep 22 2020 47 mins
    Yubico team
    Join us for an interactive session on the new YubiKey 5C NFC. Learn about the new features and benefits of our latest device in the YubiKey 5 Series. We will cover how the YubiKey 5C NFC protects your most important business applications on modern phones and computers using multi-protocol authentication, how it's different from our other devices, and our competitive advantages. We'll also help you identify who in your organization should use the YubiKey 5C NFC, as well as critical use cases to ensure you're getting the most value out of your YubiKey subscription.
  • Extending YubiKey FIDO2 Hardware Token to Systems and Interfaces with Silverfort Recorded: Sep 22 2020 40 mins
    Jonathan Nativ, Silverfort, and David Treece, Yubico
    Now more than ever, organizations need a holistic authentication solution to maximize security without disrupting productivity. An efficient way to do so is to strengthen weak static username/password credentials with strong FIDO2 hardware-backed public/private-key credentials.

    In this session with Silverfort and Yubico experts, we’ll review the integrated solutions, discuss key customer use cases and explain how you can now:
    o Extend FIDO2 hardware-backed Multi-Factor Authentication to any system or interface
    o Enforce strong authentication without implementing software agents, changing application code, or using proxies
    o Take advantage of the integrated solutions to address various use cases
  • Säkra upp inloggning i er organisation - YubiKey är lösningen Recorded: Sep 16 2020 53 mins
    Per Erngård (Yubico), Fredrik Åström, Anders Ihs & Emil Vidmark (Arctic Group)
    Arbete hemifrån öppnar upp för nya möjligheter och med det tillkommer även fler risker och utmaningar. Arctic Group och Yubico bjuder in till webinar den 16 september för att lära dig använda säker inloggning.

    81 % av alla intrång kan kopplas till stulna eller svaga lösenord och genom att stjäla identiteter och lösenord kan hackare enkelt komma åt era IT-miljöer utan att väcka någon större misstanke.

    Genom att tillföra fler lager säkerhet vid autentisering, s.k. multifaktorautentisering (MFA), krävs inte bara användarnamn och lösenord utan även en ytterligare verifiering. Arctic Group arbetar tillsammans med Yubico, skaparna av branschens ledande säkerhetsnyckel YubiKey, för dig som vill använda säkra er organisation och minska arbetet i er verksamhet med hjälp av modern autentisering. Du behöver ingen teknisk kompetens utan detta är för dig som vill effektivisera inloggning och samtidigt ha hög säkerhet i er organisation.

    Confidentiality and Data Processing:
    The information you provide in this form will be held in confidence by Yubico AB, its Affiliates, and its partner, Arctic Group. Any personal information submitted in this form will be used by Yubico AB., its Affiliates, and Arctic Group for their performance of this webinar, and as such, you agree to being contacted and receiving relevant marketing materials from Yubico AB., its Affiliates, and Arctic Group. “Affiliate” means an entity that, directly or indirectly, controls, is controlled by, or is under common control with Yubico AB.
  • The Future of Federal Identity Panel- SNG Live IT Modernization Recorded: Sep 15 2020 17 mins
    Jeff Fredrick, Sr. Solutions Engineer (Yubico)
    Federal agencies have made demonstrable progress modernizing their IT in recent years. With the outbreak of the coronavirus and the displacement of the federal workforce, leaders face even greater urgency to accelerate the modernization of their legacy systems.

    Listen to CW5 Will Robinson, CTO & Senior Technical Advisor, CIO/G-6, U.S. Army and Jeff Frederick, Sr. Solutions Engineer, Yubico discuss the future of federal identity with Billy Mitchell, Editor-in-Chief of FedScoop.
  • Advancing Digital Transformation in Healthcare Recorded: Sep 8 2020 63 mins
    Alex Hilton - CEO, Cloud Industry Forum | Andy Winiarski - Yubico | David McLeman - Ancoris | Max Faun - Okta
    To say Digital Transformation can be tricky for the healthcare industry is an understatement. Copious streams of data, numerous IT systems that require interoperability, hundreds of vendors and the need for better employee and patient experience has seen the healthcare sector fall short of the progress being made in banking, retail and manufacturing.

    But powered by the global health crisis of Covid-19, the importance of technology in the future of healthcare has never been more in the spotlight. Join us for episode 11 of Digital Transformation in Action, where we put DX and healthcare under the lens and discuss:

    - How to push forward Digital Transformation in healthcare with the right AI, RPA, data transformation and cyber security strategies
    - How emerging technologies are pushing a patient-first approach
    - Why the barriers to implementing a digital-first reality in healthcare are often not technological - but embracing a change of culture

    Host:
    Alex Hilton - CEO, Cloud Industry Forum

    Guests:
    Andy Winiarski - Solutions Engineer, Yubico
    David McLeman - CEO, Ancoris
  • Deploy Strong Authentication in Microsoft Azure Environments with Yubico Recorded: Aug 27 2020 42 mins
    Jason Edgewater, Enterprise Sales, Central (Yubico), Jeet Shah, Solutions Engineer (Yubico)
    Passwords are broken. And basic 2FA, like mobile, email, and SMS, are not enough to prevent today's sophisticated threats. Yubico, a member of the Microsoft Intelligent Security Association, is the leading provider of hardware-based strong authentication security keys — the most effective way to combat account takeovers.

    Join us to learn about YubiKeys can improve authentication security and usability, at a lower total cost of ownership. In this webinar, we will cover:
    -How organizations can use YubiKeys in Microsoft environments
    -How to deploy, integrate, and scale YubiKeys — even with a remote workforce
    -The password less future for Yubico and Microsoft

    A recording of the webinar will be shared with all registrants, so please reserve your seat today!


    Confidentiality and Data Processing:
    The information you provide in this form will be held in confidence by Yubico, Inc. and its Affiliates. Any personal information submitted in this form will be used by Yubico, Inc. and its Affiliates, for their performance of this webinar, and as such, you agree to being contacted and receiving relevant marketing materials. “Affiliate” means an entity that, directly or indirectly, controls, is controlled by, or is under common control with Yubico, Inc.

    Your personal data is retained only as needed in accordance with Yubico data retention practices. The Yubico Privacy Notice offers more information about Yubico privacy practices, including the lawful basis for processing of personal data, how to lodge a complaint with the supervisory authority, and how to contact Yubico to exercise your data subject rights.
  • Hacking The Election: The Human Side [Part 1] Recorded: Aug 20 2020 55 mins
    David Morris | Lee Imrey | Midori Connolly | Lance James
    In the age of data collection and targeting by the campaigns, what can we learn from Gen Z? When it comes to data sharing, privacy and security awareness, what has changed in the population mindset since 2016? Are the lessons from the Cambridge Analytica scandal still applicable today? A soft preview of what's to come in the November election.

    Moderator: David Morris, Executive Director at Digital Risk Management Institute

    This episode is part of the Election Hacking Original series examining the threats to democratic elections, the technologies used to power and hijack elections, and what's needed to educate and empower voters before Election Day.
  • Supply Chain Security Recorded: Aug 18 2020 56 mins
    Diana Kelley | Kiersten Todt | Nick Charpentier
    According to new research from Risk Ledger, 60% of security breaches originate in the organization's supply chain; including third party vendors and applications. No matter what business an organization is in, supply chain security and resilience must be factored into business planning to ensure secure, ongoing operations even during times of crisis and disruption.

    Join this panel to learn more about:
    - Types of supply chains (hardware, software, services)
    - Common vulnerabilities in the supply chain
    - Assessing where your security gaps lie and addressing the risk
    - Impact of the COVID-19 pandemic on supply chain security
    - Recommendations for improving security in your supply chain and your risk management program
    - Benefits of Supply Chain Risk Management (SCRM)
    - What is the Cybersecurity Maturity Model (CMM), and how it can improve supply chain security
    - Solutions and approaches that can improve supply chain security

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • Securing remote workers: The critical role of strong authentication Recorded: Aug 17 2020 51 mins
    Abby Guha, Senior Director, Product Marketing, Yubico
    The need to support remote workers and provide them with secure and easy access to business systems and applications is critical as ever. As many organizations plan for the "new normal," which may involve continued support for a large remote workforce post-pandemic, they need to ask, “Can employees access systems remotely without introducing new risks and vulnerabilities?”

    Hackers are continuing to take advantage of this current state of uncertainty with targeted phishing attacks. As legacy and mobile-based authentication solutions are especially vulnerable to hacking, enterprises should make it an imperative to modernize multi-factor authentication.

    Attend this webinar to learn:
    - How to secure remote workers while accelerating business productivity
    - Why MFA should be a top requirement for supporting a distributed workforce
    - Best practices for securing remote workers against phishing and other cyber attacks
  • Key steps for election officials & campaigners to secure the 2020 elections Recorded: Aug 4 2020 51 mins
    Michael Kaiser (DDC) Ethan Chumley (Microsoft) Joe Stocker (Patriot Consulting) Cody Hussey (Yubico) Ronnie Manning (Yubico)
    With the 2020 elections coming up, it’s more important than ever to ensure security and integrity of elections and related political processes. This 50 minute roundtable webinar featuring cybersecurity experts in the field of election security from Defending Digital Campaigns (DDC), AccountGuard services by Microsoft, Patriot Consulting and Yubico, will explore the current landscape of cyber attacks across the election ecosystem, and measures that political campaigners and election officials can take to ensure greater security and integrity from now through November. Participants are encouraged to submit questions through the interactive chat during the call.

    Attend this roundtable webinar to learn:
    -Current cyber threats to the political and election ecosystem along with ecosystem endpoints that need to be protected
    -Best practice cybersecurity detections and protection programs and solutions available today along with immediate steps officials can take to secure political campaigns and election ecosystems

    Confidentiality and Data Processing:
    The information you provide in this form will be held in confidence by Yubico, Inc. and its Affiliates. Any personal information submitted in this form will be used by Yubico, Inc. and its Affiliates, for their performance of this webinar, and as such, you agree to being contacted and receiving relevant marketing materials. “Affiliate” means an entity that, directly or indirectly, controls, is controlled by, or is under common control with Yubico, Inc.

    Your personal data is retained only as needed in accordance with Yubico data retention practices. The Yubico Privacy Notice offers more information about Yubico privacy practices, including the lawful basis for processing of personal data, how to lodge a complaint with the supervisory authority, and how to contact Yubico to exercise your data subject rights.
  • Driving Digital Transformation in Financial Services Recorded: Jul 28 2020 62 mins
    Alex Hilton - Cloud Industry Forum | Chris Ibbitson - HPE | Gordon Harrison - Jumio | Jaime Dal Porto - Yubico
    Digital Transformation in Financial Services' time has arrived, says IBS Intelligence. According to Finextra, ‘COVID-19 is likely to spur a widespread and systematic revamping of high-impact digital journeys in the banking sector, such as customer onboarding and product origination, to deliver a truly outstanding digital experience to their customers.’

    Join episode 10 of Digital Transformation in Action where we examine this revamping and see how Digital Transformation in banking has evolved to meet new concerns and customer needs. Alex Hilton and guests will be looking at:

    - How Digital Transformation can help banks find new revenue streams, particularly in the era of Open Banking
    - How emerging technologies such as AI and machine learning can control and reduce costs
    - How - as the number of transactions and applications increase - Digital Transformation is helping banks and financial service companies embrace strong authentication, including passwordless
    - Use cases of how DX projects have lead to significantly improved customer experience

    Host:
    Alex Hilton - CEO, Cloud Industry Forum

    Panellists:
    Jaime Dal Porto - Head of Services, Yubico
    Gordon Harrison - Head of Sales, EMEA, Jumio
    Chris Ibbitson - Chief Technologist, Financial Services Industry, HPE
  • Top Threats Campaigns are Facing and How to Address Them Recorded: Jul 22 2020 60 mins
    David Morris | Mick Baccio | Frank Snyder | Lance James
    As the 2020 U.S. presidential election draws near, let's take a look at the top cyber threats campaigns are facing this election cycle and what can be done to address them.

    The lessons can easily be applied to the private sector and enable organizations to take steps toward better security.

    Join this panel to ask your questions and learn more about:
    - Domain spoofing
    - Email threats
    - Information warfare
    - Cyber attacks

    Speakers:
    - Mick Baccio, Splunk
    - Frank Snyder, Yubico
    - Lance James, Unit 221B

    Moderator: David Morris, Executive Director at Digital Risk Management Institute

    This episode is part of the Election Hacking Original series examining the threats to democratic elections, the technologies used to power and hijack elections, and what's needed to educate and empower voters before Election Day.
  • Why govt. agencies should pay attention to FIDO U2F and WebAuthn/FIDO2 right now Recorded: Jul 22 2020 46 mins
    Danelle Barrett (Deep Water Point), Mark Russell (The MITRE Corporation), Jeff Frederick (Yubico), Jeff Phillips (Yubico)
    Don’t miss this roundtable discussion on FIDO U2F and WebAuthn/FIDO2, and why these modern authentication standards are critical to the government’s security strategy. We’re speaking with Danelle Barrett, Former Rear Admiral, Director Navy Cyber Security and Deputy Chief Information Officer.

    FIDO U2F and WebAuthn/FIDO2 authentication standards are revolutionizing web authentication across the government and public sector. They ensure strong public key cryptography like PIV and CAC but don’t require a PKI backend; making it cost-effective, simple and secure for employees, contractors and partners to log in to web-facing applications and services.

    Register for this roundtable discussion to learn:
    -What is FIDO U2F and WebAuthn/FIDO2?
    -Why do government agencies need to get ahead of the WebAuthn/FIDO2 and FIDO U2F curve?
    -Best practices for cyber security and authentication using FIDO U2F and WebAuthn/FIDO2 hardware security keys
    -How these standards help drive full coverage authentication across work and personal accounts, air gap networks, and derived credentials

    Confidentiality and Data Processing:
    The information you provide in this form will be held in confidence by Yubico, Inc. and its Affiliates. Any personal information submitted in this form will be used by Yubico, Inc. and its Affiliates, for their performance of this webinar, and as such, you agree to being contacted and receiving relevant marketing materials. “Affiliate” means an entity that, directly or indirectly, controls, is controlled by, or is under common control with Yubico, Inc.

    Your personal data is retained only as needed in accordance with Yubico data retention practices. The Yubico Privacy Notice offers more information about Yubico privacy practices, including the lawful basis for processing of personal data, how to lodge a complaint with the supervisory authority, and how to contact Yubico to exercise your data subject rights.
  • How to Scale Passwordless Within The Global Enterprise Recorded: Jul 21 2020 28 mins
    Wes Dunnington, Field CTO (Ping Identity, Karen Larson, Director Strategic Integrations (Yubico)
    Data continues to show that passwords remain the biggest security blind spot for enterprises today. Advances in mobile technology and security standards have provided organizations with strong authentication capabilities to minimize password risk. However, with the shift to remote work accelerating, the employee experience and productivity are more important than ever, and passwordless initiatives are becoming a priority for organizations of all sizes.

    Join Ping and Yubico for ideas on how enterprises can work towards implementing passwordless at scale. Topics we will discuss are:
    - The different passwordless scenarios
    - Practical steps that you can take today
    - Latest advancements in technology such as YubiKeys and FIDO
    We will share experience gained from real-world implementations across our enterprise base and demonstrate why now is the time to get started on your passwordless journey.
  • Government continuity in the telework era: A round table with USPS, State of Pen Recorded: Jul 14 2020 21 mins
    Greg Crabb (USPS), John MacMillan (Pennsylvania), Guido Appenzeller (Yubico), Jake Williams (StateScoop & EdScoop)
    Government agencies across the country faced an unprecedented shift to mass telework when the coronavirus pandemic arrived stateside. For most, remote working went from a convenient option to a mandate. And with it, things like device management, collaboration tools and connectivity via virtual private networks and the cloud became more important than ever.

    This SNG Live panel discussion retraces the steps agencies took to secure telework, how they set their workforce up for mission continuity, and what challenges they had to overcome.

    Speakers for Yubico panel:

    * Greg Crabb, CISO, USPS
    * John MacMillan, Deputy Secretary for Information Technology and CIO, State of Pennsylvania
    * Guido Appenzeller, Chief Product Officer, Yubico
    * Jake Williams, Associate Publisher, StateScoop & EdScoop (moderator)
  • YubiHSM - The world’s smallest HSM Recorded: Jul 8 2020 35 mins
    Bettina Vahl (Sr. Channel Manager) & Nic Sarginson (Sr. Solutions Engineer)
    The YubiHSM 2 ensures secure hardware cryptographic key storage and operations for applications, servers and computing devices while eliminating the cost and complexity of traditional HSMs. With the open source SDK, organisations can rapidly integrate the YubiHSM 2 and easily build support for hardware-based strong security into a wide array of platforms, applications and services.

    In this webinar, we are going to cover the most common use cases around securing an organisation’s digital infrastructure with the YubiHSM 2.

    - Value proposition
    - Business scenarios
    - Reference cases
  • Security and Privacy During COVID-19 Recorded: Jul 2 2020 64 mins
    Dr. Dan Boneh, Professor of Computer Science and Electrical ENG, Stanford University and Christopher Harrell, Yubico CTO
    Join Dr. Dan Boneh, Professor of Computer Science and Electrical Engineering, Stanford University and Christopher Harrell, Yubico CTO for a discussion on the state of security and privacy during the worldwide COVID-19 pandemic.
Your Key to Trust
Yubico was founded in 2007 with the mission to make secure login easy and available for everyone. In close collaboration with leading internet companies and thought leaders, Yubico co-created the FIDO U2F and FIDO2/WebAuthn open authentication standards, which have been adopted in major online platforms and browsers, enabling two-factor, multi-factor, and passwordless login and a safer internet for billions of people.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How to Scale Passwordless Within The Global Enterprise
  • Live at: Jul 21 2020 4:35 pm
  • Presented by: Wes Dunnington, Field CTO (Ping Identity, Karen Larson, Director Strategic Integrations (Yubico)
  • From:
Your email has been sent.
or close