Hi [[ session.user.profile.firstName ]]

Centrify and Amar Singh at Infosecurity Europe 2018

Join Barry Scott, Centrify and Amar Singh, Cyber Management Alliance live from Infosecurity Europe 2018
Recorded Jun 20 2018 12 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Barry Scott, Centrify and Amar Singh, Cyber Management Alliance
Presentation preview: Centrify and Amar Singh at Infosecurity Europe 2018

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Dissecting Just-in-Time PAM Jun 4 2020 7:00 am UTC 60 mins
    Tariq Jitan, Systems Engineer - MEA, Centrify
    Join this webinar to find out:

    - Key challenges of a basic PAM tool
    - What is Just-In Time PAM
    - Just-In-Time approaches
    - Demonstrations of Centrify's approach
  • Identity Centric PAM - Protecting the new security perimeter for multi-cloud Recorded: May 21 2020 56 mins
    Marco Zhang, Director of Systems Engineering APJ at Centrify
    Emerging technologies fuelling digital transformation are reshaping the enterprise IT environment. As organizations continue their digital transformation journeys, they struggle to manage an infrastructure that is fragmented across hybrid- and multi-cloud environments, resulting in data breaches, audit findings, and unnecessary overhead costs.

    Underlying the foundation of digital transformation are privileged access controls, which ensure that only authorized individuals, machines, or services are permitted to access the right resources, at the right time, for the right reasons. Centrify enables digital transformation at scale, modernizing how organizations secure privileged access across hybrid and multi-cloud environments by enforcing Identity-Centric PAM based on Zero Trust principles.

    The webinar will cover:

    •The new security perimeter
    •PAM challenges in multi-cloud
    •Critical use cases for multi-cloud
    •Demonstration
  • Was ist Just-in-Time Privilege Access Management Recorded: May 20 2020 47 mins
    Achim Ziermann, Systems Engineer DACH, Centrify
    Die Anzahl der Einbrüche in Unternehmensnetze ist in den letzten Jahren explodiert. Organisationen müssen erkennen, das Perimeter basierte Sicherheit gegen die größte Bedrohung, der Missbrauch von privilegierten Konten, nicht mehr ausreichenden Schutz bietet. Organisationen, die ein PAM System nutzen und nur Passwörter in einem Tresor oder Password Manager verwalten, laden durch fehlende Funktionen zum Missbrauch ein.

    Die Themen des Webinars:

    •Zentrale Herausforderungen eines PAM Tools
    •Was ist “Just-In Time PAM”
    •Just-In-Time Konzepte
    •Demonstration der Centrify Konzepte.
  • Improve Your SAMA Compliance Posture with Identity-Centric PAM Recorded: May 11 2020 51 mins
    Dr. Torsten George, Cyber Security Evangelist at Centrify, Samer Jadallah Vice President, KSA & Bahrain at StarLink
    In an era when cyber-attacks have become common occurrences, it's vital for the Saudi Arabian Banking, Financial Services, and Insurance (BFSI) industry to improve its cyber resilience. In this context, the SAMA Cyber Security Framework offers a comprehensive set of best practices that are quite prescriptive by nature. However, becoming and staying compliant in today’s dynamic threatscape is often challenging.

    Don’t miss out on this webcast to learn how to address today’s #1 attack vector ― privileged access abuse ― and surpass SAMA’s regulatory mandates.

    The webinar will cover the following topics:
    • SAMA Cyber Security Framework Overview
    • Current Market Drivers
    • The Role of Privileged Access Management (PAM) in Cyber Security
    • How to Meet SAMA IAM Requirements with Identity-Centric PAM

    Register for access to the live or on-demand webinar after the live event.
  • PAM without borders - a cloud first approach Recorded: May 7 2020 51 mins
    Kev Smith, Technical Director, EMEA at Centrify
    As organisations embrace cloud technologies, there is a rise in multi-cloud strategies where more than one cloud provider is being used. This can lead to more complexity around managing security and compliance if a tailored strategy around IAM and PAM is not used.

    Centrify Privileged Access Service provides a cloud-first platform that can address your business needs in these challenging new environments.

    The webinar will cover:
    •What is (multi-)cloud, and what organisations learnt from their first attempts at using it?
    •What cloud vendors propose, and how this is insufficient
    •The Centrify Privileged Access Service platform
    •2 simple use case demonstrations
  • PAM sans frontières - Une première approche du Cloud - Le 10 mars 2020 à 10h30 Recorded: Mar 10 2020 24 mins
    Frank Leavis, Senior Systems Engineer, EMEA chez Centrify
    Ce webinaire couvrira les points suivants:
    - Qu'est-ce que le (multi) cloud et quels enseignements les organisations ont-elles tirées de leurs premières tentatives d'utilisation?
    - Ce que proposent les fournisseurs de Cloud et pourquoi cela est insuffisant
    - La plateforme Centrify Privilege Access Service
    - 2 démonstrations de cas d'utilisation simples
  • Dissecting Just-in-Time PAM Recorded: Mar 5 2020 60 mins
    Marco Zhang, Director of Systems Engineering APJ, Centrify
    Join this webinar to find out:

    - Key challenges of a basic PAM tool
    - What is Just-In Time PAM
    - Just-In-Time approaches
    - Demonstrations of Centrify's approach
  • EMEA: Anatomy of a Hack: Perception vs. Reality Recorded: Mar 3 2020 60 mins
    Chris Owen, Director of Product Management, Centrify.
    Join this webinar to learn the 3 major phases of the “cyber-attack lifecycle” (aka “kill chain”) and important measures for preventing data exfiltration, including:

    •Enforcing MFA
    •Using host-based auditing
    •Leveraging machine learning algorithms to monitor, identify, and alert on high risk activity
  • Securing Containers with Centrify Zero Trust Privilege Recorded: Dec 3 2019 47 mins
    Marco Zhang, Director of Systems Engineering APJ
    Join this webinar to find out:

    •Understanding container technologies
    •Major risks of container technologies
    •How Centrify Zero Trust Privilege helps to address these risks
    •Use Case Demonstrations
  • DevOps & Cloud Automation with Centrify Privileged Access Service Recorded: Nov 20 2019 40 mins
    – Kev Smith, EMEA Lead Systems Engineer, Centrify
    • What is DevOps?
    • Automation/orchestration use cases
    • How Centrify Privileged Access Service can help
    • 2 simple use case demonstrations
  • APJ: Exposing The Myths Around Passwords Vaults Recorded: Sep 10 2019 33 mins
    Chris Owen, Director of Product Management, Centrify
    Join this webinar to find out:
    • How Password Vaults have evolved
    • The challenges in using today’s Password Vault solutions
    • How Centrify enables customers to operate without the overhead of legacy Vault solutions
    •The Zero Trust Privilege Management Approach
  • Danger! High Vault-age!: Exposing the myths around passwords vaults Recorded: Aug 21 2019 40 mins
    Chris Owen, Director of Product Management, Centrify
    Join this webinar to find out:
    •How Password Vaults have evolved
    •The challenges in using today’s Password Vault solutions
    •How Centrify enables customers to operate without the overhead of legacy Vault solutions
    •The Zero Trust Privilege Management Approach
  • APJ: Successfully Implementing Credential Tiering Using Zero Trust Privilege Recorded: Jul 24 2019 54 mins
    Presenter – Chris Owen, Director of Product Management, Centrify
    Join this webinar to find out:
    - What is credential tiering?
    - Why is credential tiering a recommended control?
    - How to mitigate the risk of credential-based attacks
    - Centrify’s Zero Trust Privilege Management Solution
  • The Anatomy of a Hack: Perception vs. Reality Recorded: Jul 12 2019 56 mins
    Time Steinkopf, CEO Centrify, Andy Smith, VP Marketing, Centrify
    The anatomy of a hack has been glorified, leading to the common belief that data breaches require a tremendous amount of sophistication. However, post-mortem analysis has repeatedly found that the source of a hack is often due simply to compromised credentials.

    Watch Anatomy of a Hack: Perception vs. Reality webinar to learn about the 3 major phases of the “cyber-attack lifecycle” or “kill chain” and most importantly measures for preventing data exfiltration, including: Enforcing MFA; Using host-based auditing and monitoring; and Leveraging machine learning algorithms to monitor, identify, and alert on high-risk activity.
  • EMEA: Successfully Implementing Credential Tiering Using Zero Trust Privilege Recorded: Jun 18 2019 45 mins
    Chris Owen, Director of Product Management, Centrify
    Join this webinar to find out:
    •What is credential tiering?
    •The impact of credential-based attacks on users
    •How to mitigate the risk of credential-based attacks
    •How to effectively implement credential tiering using Centrify’s Zero Trust Privilege
  • Debunked: 5 Myths About Zero Trust Security Recorded: Feb 18 2019 60 mins
    Tony Goulding, Director of Technical Marketing, Centrify; Torsten George, Senior Director Product Marketing, Centrify
    In 2018, Zero Trust Security gained popularity due to its simplicity and effectiveness. Yet despite a rise in awareness, many organisations still don’t know where to start or are slow to adopt a Zero Trust approach.

    The result? Breaches affected as many as 66% of companies just last year. And as hackers become more sophisticated and resourceful, the number of breaches will continue to rise.

    Unless organisations adopt Zero Trust Security. In 2019, take some time to assess your company’s risk factors and learn how to implement Zero Trust Security in your organisation.

    Getting started is easy. Watch today to hear from Tony Goulding, Director of Technical Marketing and Torsten George, Senior Director, Product Marketing as they:

    - Review 4 essential pillars of Zero Trust Security
    - Debunk 5 major myths about Zero Trust
    - Share best practices to ensure a successful implementation
  • Zero Trust Security: How to Strengthen Your Security Posture Recorded: Sep 13 2018 20 mins
    Ian Stimpson, Systems Engineer.
    Zero Trust Security is quickly rising as a preferred alternative to traditional security approaches. Traditional security perimeters are no longer compatible with today’s business models as both corporate assets and users are increasingly outside the perimeter, while targeted, advanced threats are shifting inside.

    During this live webinar, our expert, Ian Stimpson, will provide a high level overview of the Zero Trust model and discuss some of the most pressing security issues facing organisations today. Ian will demonstrate how adopting a Zero Trust security approach can help you overcome these challenges and increase your security posture, whilst improving the user experience.

    Explore the Zero Trust approach to security and watch product demonstrations to learn how Centrify:

    Verifies the User, ensuring authenticity of every user before access to a resource is ever granted.

    Validates the Device, enabling access from trusted devices only, minimising endpoint threat vectors and increasing endpoint security posture.

    Limits Access and Privilege, minimising the attack surface, limiting lateral movement and reducing breach-related damage.
  • Rise above the Noise - Zero Trust from Centrify Recorded: Aug 17 2018 7 mins
    Rhonda Shantz, Centrify CMO and Bill Mann, Centrify Chief Product Officer
    There is a lot of noise in the market place, with over 100 companies talking about Zero Trust.

    However, there's only one company whose entire product line, and whose position in the market place is Zero Trust Security, and that's Centrify.

    In this 7 minute video, Centrify CMO Rhonda Shantz talks about the 'noise' in the market place, and how this is fuelling misconceptions as to what the real problem actually is, and why, despite billions of spending on cybersecurity, 66% of companies are still being breached.

    This is followed by a summary overview of the 4 pillars of the Centrify Zero Trust model; Verify the User, Validate the Device, Limit Access and Privilege and Learn and Adapt, delivered by Centrify's product experts.
  • Security, Privacy and the Next Generation Workforce (Podcast) Recorded: Aug 17 2018 30 mins
    Barry Scott, CTO Centrify EMEA
    Yahoo, Equifax and Uber are just some of the high-profile brands hit by breaches during the past twelve months but could it be younger workers that pose the biggest risk to an organisation's IT security?

    Centrify surveyed 1000 UK office workers aged 18 to 24 and 500 UK senior decision makers to measure what the decision makers think of the next generation workforce’s approach to security and compare it to real-world attitudes.

    Is there a significant gap between perception and reality in decision makers view of younger workers? The results may surprise you!

    In this podcast, Centrify's CTO Barry Scott and SC Media's Editor-in-Chief Tony Morbin discuss the next generation of workers and how their behaviour could impact the workplace.

    After listening to the podcast, don't forget to download the full report.
  • Zero Trust Security: Reduce Breaches, Complexity, and Cost Recorded: Jul 10 2018 34 mins
    Barry Scott, CTO EMEA
    More than 5 million data records are lost or stolen worldwide every single day, according to the Breach Level Index. That’s a staggering 59 records every second. According to the Ponemon Institute, to recover from these incidents, organizations spent on average $3.6 million per breach. It’s also worth remembering the potential for reputational damage that can create a downswing in an organization’s fortunes. For example, Yahoo!’s data breach proved very costly, wiping out $350 million off Verizon’s acquisition payment.

    Thus, it has become critical for organizations to find ways to reduce the risk of falling victim to a breach, as well as reduce complexity and cost in securing applications, devices, and infrastructure ― both on-premise and in the cloud.

    Join this webinar to learn:

    • How to assess the full impact of data breaches, ranging from direct costs, reputation damage, and customer loss to declines in revenue.
    • How misperceptions linked to the root cause of hacking-related breaches skew IT security spending and how to align your security investments to achieve higher effectiveness.
    • How the Zero Trust Security model can help shield your organization and its reputation from devastating and long-term financial consequences of a breach.
Regular live & on demand webinars for CISOs and IT professionals
Centrify’s channel provides webinars that will inform and educate on Privilege Access Management. Centrify’s Zero Trust Privilege redefines legacy Privileged Access Management (PAM) for the modern enterprise IT threatscape. Organisations must discard the old model of “trust but verify”, which relied on well-defined boundaries. Zero Trust mandates a “never trust, always verify, enforce least privilege” approach to privileged access, from inside or outside the network.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Centrify and Amar Singh at Infosecurity Europe 2018
  • Live at: Jun 20 2018 2:50 pm
  • Presented by: Barry Scott, Centrify and Amar Singh, Cyber Management Alliance
  • From:
Your email has been sent.
or close