Hi [[ session.user.profile.firstName ]]

Zero Trust Security: Your Talk Track for the Boardroom

More than 5 million data records are lost or stolen worldwide every single day, according to the Breach Level Index. That’s a staggering 59 records every second. With the scares of WannaCry and Petya, your board is asking, “what the hell are we doing to protect ourselves?” You need answers. The problem, highlighted in a recent WSJ study, showed that 62% of CEOs incorrectly cite malware as the primary threat to cybersecurity, whereas CIOs, CISOs, CTOs realize that 68% of breaches would have been prevented by identity security, vs. only 8% for anti-malware. In fact, the 2017 Verizon Breach Investigations Report found that 81% of breaches were due to lost, stolen or default passwords. 

Your board wants to know what you’re doing about ransomware, but rather than randomly chasing the latest newsworthy incident. present a strategic Zero Trust Security plan that addresses the real issue and defines a practical and proven direction that not only protects against breaches, but also enables your business the freedom to transform and grow in spite of the growing threatscape. 

Join this webinar to learn:
• What is the real threat that must be addressed to protect you from breaches.
• What is Zero Trust Security and how does it address the modern threatscape? 
• Who else is talking about Zero Trust Security and what have they been able to achieve?
• How to talk to your board about a consistent and strategic approach rather than reactive and defensive.
Recorded Jul 3 2018 41 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Barry Scott, CTO Centrify EMEA
Presentation preview: Zero Trust Security: Your Talk Track for the Boardroom

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Identity-Centric PAM for Cloud and DevOps Recorded: Oct 29 2020 58 mins
    Chris Owen, Director, Product Management at Centrify
    According to recent research by the Identity-Defined Security Alliance (IDSA), 59% of organizations say that cloud applications are driving a 5X increase in the number of identities over the past 10 years. And, over the past two years, 79% have had an identity-related breach.

    Digital transformation has massively expanded the threatscape, as modern technologies like cloud, DevOps, containers, microservices and more are creating an explosion in the number of machine identities in the IT estate. Now more than ever, it’s vital to take an identity-centric approach to securing privileged access to resources in on-premises, hybrid, and multi-cloud environments.

    In this webinar from Centrify, an IDSA member, we’ll explore:
    1. How organizations have evolved their use of cloud
    2. How Privileged Access Management (PAM) solutions have transformed to support new methodologies and tooling
    3. The differences between a shared account approach and identity-centric approach to PAM
    4. 6 key challenges organizations face for DevSecOps when it comes to cloud, and how to solve them
  • PAM 101: Cloud Recorded: Oct 1 2020 54 mins
    Chris Owen, Director of Product Management
    CLOUD PAM, WHAT IS IT?

    Digital transformation is at the heart of organizations embracing cloud technologies. As we make this shift to the cloud, our approach to Privileged Access Management (PAM) needs to be re-defined in order to protect access to the cloud and workloads within the cloud.

    Join our webinar as we take things back to the basics; taking a look at what Cloud PAM really is, and how it can enable you to reduce risk within your environment. We’ll look over the following key areas:

    - The adoption of cloud and multi-cloud
    - Protecting access to the cloud and workloads in the cloud
    - What is cloud PAM?
    - The different types of cloud PAM solutions
    - Key Gotcha’s and things to watch out for
  • PAM 101 Recorded: Aug 27 2020 58 mins
    Chris Owen, Director of Product Management
    WHAT IS PRIVILEGED ACCESS MANAGEMENT (PAM)?

    With so many names, acronyms and vendor capabilities, understanding PAM can be a challenge.

    Join us for this live webinar to learn what Privileged Access Management is and how PAM can enable you to reduce risk within your environment. We will review over the following key areas:

    - What is Privileged Access Management
    - Key objectives we see in every PAM project
    - The history and evolution of PAM
    - Key "gotchas" and things to watch out for
    - The PAM maturity model
  • AD Bridging and MFA Everywhere with Centrify Recorded: Aug 18 2020 31 mins
    Michael Woo, Systems Engineer
    Enterprise organisations now exist in a mixed hybrid environment, with workloads running in the cloud and on prem, either on Windows or Linux. Traditionally this is a headache for system administrators having to manage multiple credentials across Active Directory and local Linux accounts.
    Simplify and Centralise with Centrify by allowing users to logon with their AD credentials and have MFA enforced on a Linux/Unix host.
    Granular controls allow privilege elevation down to the command executed with MFA enforcement ensuring identity is verified at each stage.

    This webinar will cover these aspects and a demonstration on how Centrify can help you achieve this.
  • An Identity-Centric Approach to Privilege Management in the Cloud Recorded: Jun 16 2020 57 mins
    Chris Owen, Director of Product Management
    Cloud adoption is changing the privileged access management landscape. PAM tools were originally designed to protect assets within our data centre, within our directory, physical and virtual servers under our control and applications under our management. As enterprise organisations are adopting public cloud with not just one vendor, often multiple vendors, our challenge of securing privileges and reducing risk becomes more complex. Join us for this webinar where we’ll discuss some of the challenges with privilege management in the cloud and how an identity-centric approach enables you to reduce your risk of exposure.
  • Dissecting Just-in-Time PAM Recorded: Jun 4 2020 48 mins
    Tariq Jitan, Systems Engineer - MEA, Centrify
    Join this webinar to find out:

    - Key challenges of a basic PAM tool
    - What is Just-in-Time PAM?
    - Just-in-Time approaches
    - Demonstrations of Centrify's approach
  • Identity Centric PAM - Protecting the new security perimeter for multi-cloud Recorded: May 21 2020 56 mins
    Marco Zhang, Director of Systems Engineering APJ at Centrify
    Emerging technologies fuelling digital transformation are reshaping the enterprise IT environment. As organizations continue their digital transformation journeys, they struggle to manage an infrastructure that is fragmented across hybrid- and multi-cloud environments, resulting in data breaches, audit findings, and unnecessary overhead costs.

    Underlying the foundation of digital transformation are privileged access controls, which ensure that only authorized individuals, machines, or services are permitted to access the right resources, at the right time, for the right reasons. Centrify enables digital transformation at scale, modernizing how organizations secure privileged access across hybrid and multi-cloud environments by enforcing Identity-Centric PAM based on Zero Trust principles.

    The webinar will cover:

    •The new security perimeter
    •PAM challenges in multi-cloud
    •Critical use cases for multi-cloud
    •Demonstration
  • Was ist Just-in-Time Privilege Access Management Recorded: May 20 2020 47 mins
    Achim Ziermann, Systems Engineer DACH, Centrify
    Die Anzahl der Einbrüche in Unternehmensnetze ist in den letzten Jahren explodiert. Organisationen müssen erkennen, das Perimeter basierte Sicherheit gegen die größte Bedrohung, der Missbrauch von privilegierten Konten, nicht mehr ausreichenden Schutz bietet. Organisationen, die ein PAM System nutzen und nur Passwörter in einem Tresor oder Password Manager verwalten, laden durch fehlende Funktionen zum Missbrauch ein.

    Die Themen des Webinars:

    •Zentrale Herausforderungen eines PAM Tools
    •Was ist “Just-In Time PAM”
    •Just-In-Time Konzepte
    •Demonstration der Centrify Konzepte.
  • Improve Your SAMA Compliance Posture with Identity-Centric PAM Recorded: May 11 2020 51 mins
    Dr. Torsten George, Cyber Security Evangelist at Centrify, Samer Jadallah Vice President, KSA & Bahrain at StarLink
    In an era when cyber-attacks have become common occurrences, it's vital for the Saudi Arabian Banking, Financial Services, and Insurance (BFSI) industry to improve its cyber resilience. In this context, the SAMA Cyber Security Framework offers a comprehensive set of best practices that are quite prescriptive by nature. However, becoming and staying compliant in today’s dynamic threatscape is often challenging.

    Don’t miss out on this webcast to learn how to address today’s #1 attack vector ― privileged access abuse ― and surpass SAMA’s regulatory mandates.

    The webinar will cover the following topics:
    • SAMA Cyber Security Framework Overview
    • Current Market Drivers
    • The Role of Privileged Access Management (PAM) in Cyber Security
    • How to Meet SAMA IAM Requirements with Identity-Centric PAM

    Register for access to the live or on-demand webinar after the live event.
  • PAM without borders - a cloud first approach Recorded: May 7 2020 51 mins
    Kev Smith, Technical Director, EMEA at Centrify
    As organisations embrace cloud technologies, there is a rise in multi-cloud strategies where more than one cloud provider is being used. This can lead to more complexity around managing security and compliance if a tailored strategy around IAM and PAM is not used.

    Centrify Privileged Access Service provides a cloud-first platform that can address your business needs in these challenging new environments.

    The webinar will cover:
    •What is (multi-)cloud, and what organisations learnt from their first attempts at using it?
    •What cloud vendors propose, and how this is insufficient
    •The Centrify Privileged Access Service platform
    •2 simple use case demonstrations
  • PAM sans frontières - Une première approche du Cloud - Le 10 mars 2020 à 10h30 Recorded: Mar 10 2020 24 mins
    Frank Leavis, Senior Systems Engineer, EMEA chez Centrify
    Ce webinaire couvrira les points suivants:
    - Qu'est-ce que le (multi) cloud et quels enseignements les organisations ont-elles tirées de leurs premières tentatives d'utilisation?
    - Ce que proposent les fournisseurs de Cloud et pourquoi cela est insuffisant
    - La plateforme Centrify Privilege Access Service
    - 2 démonstrations de cas d'utilisation simples
  • Dissecting Just-in-Time PAM Recorded: Mar 5 2020 60 mins
    Marco Zhang, Director of Systems Engineering APJ, Centrify
    Join this webinar to find out:

    - Key challenges of a basic PAM tool
    - What is Just-In Time PAM
    - Just-In-Time approaches
    - Demonstrations of Centrify's approach
  • EMEA: Anatomy of a Hack: Perception vs. Reality Recorded: Mar 3 2020 60 mins
    Chris Owen, Director of Product Management, Centrify.
    Join this webinar to learn the 3 major phases of the “cyber-attack lifecycle” (aka “kill chain”) and important measures for preventing data exfiltration, including:

    •Enforcing MFA
    •Using host-based auditing
    •Leveraging machine learning algorithms to monitor, identify, and alert on high risk activity
  • Securing Containers with Centrify Zero Trust Privilege Recorded: Dec 3 2019 47 mins
    Marco Zhang, Director of Systems Engineering APJ
    Join this webinar to find out:

    •Understanding container technologies
    •Major risks of container technologies
    •How Centrify Zero Trust Privilege helps to address these risks
    •Use Case Demonstrations
  • DevOps & Cloud Automation with Centrify Privileged Access Service Recorded: Nov 20 2019 40 mins
    – Kev Smith, EMEA Lead Systems Engineer, Centrify
    • What is DevOps?
    • Automation/orchestration use cases
    • How Centrify Privileged Access Service can help
    • 2 simple use case demonstrations
  • APJ: Exposing The Myths Around Passwords Vaults Recorded: Sep 10 2019 33 mins
    Chris Owen, Director of Product Management, Centrify
    Join this webinar to find out:
    • How Password Vaults have evolved
    • The challenges in using today’s Password Vault solutions
    • How Centrify enables customers to operate without the overhead of legacy Vault solutions
    •The Zero Trust Privilege Management Approach
  • Danger! High Vault-age!: Exposing the myths around passwords vaults Recorded: Aug 21 2019 40 mins
    Chris Owen, Director of Product Management, Centrify
    Join this webinar to find out:
    •How Password Vaults have evolved
    •The challenges in using today’s Password Vault solutions
    •How Centrify enables customers to operate without the overhead of legacy Vault solutions
    •The Zero Trust Privilege Management Approach
  • APJ: Successfully Implementing Credential Tiering Using Zero Trust Privilege Recorded: Jul 24 2019 54 mins
    Presenter – Chris Owen, Director of Product Management, Centrify
    Join this webinar to find out:
    - What is credential tiering?
    - Why is credential tiering a recommended control?
    - How to mitigate the risk of credential-based attacks
    - Centrify’s Zero Trust Privilege Management Solution
  • The Anatomy of a Hack: Perception vs. Reality Recorded: Jul 12 2019 56 mins
    Time Steinkopf, CEO Centrify, Andy Smith, VP Marketing, Centrify
    The anatomy of a hack has been glorified, leading to the common belief that data breaches require a tremendous amount of sophistication. However, post-mortem analysis has repeatedly found that the source of a hack is often due simply to compromised credentials.

    Watch Anatomy of a Hack: Perception vs. Reality webinar to learn about the 3 major phases of the “cyber-attack lifecycle” or “kill chain” and most importantly measures for preventing data exfiltration, including: Enforcing MFA; Using host-based auditing and monitoring; and Leveraging machine learning algorithms to monitor, identify, and alert on high-risk activity.
  • EMEA: Successfully Implementing Credential Tiering Using Zero Trust Privilege Recorded: Jun 18 2019 45 mins
    Chris Owen, Director of Product Management, Centrify
    Join this webinar to find out:
    •What is credential tiering?
    •The impact of credential-based attacks on users
    •How to mitigate the risk of credential-based attacks
    •How to effectively implement credential tiering using Centrify’s Zero Trust Privilege
Regular live & on demand webinars for CISOs and IT professionals
Centrify’s channel provides webinars that will inform and educate on Privilege Access Management. As organisations continue their digital transformation journeys, they struggle to manage identities that are fragmented across hybrid- and multi-cloud environments, resulting in data breaches, audit findings, and unnecessary overhead costs. Centrify Identity-Centric PAM addresses this challenge with a cloud-native solution that simplifies privilege management by centralizing identities, and establishes a per-machine root of trust. Administrative management and access is seamless, security and compliance postures are strengthened, and machines are empowered to defend themselves against cyber-threats.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Zero Trust Security: Your Talk Track for the Boardroom
  • Live at: Jul 3 2018 2:00 pm
  • Presented by: Barry Scott, CTO Centrify EMEA
  • From:
Your email has been sent.
or close