Hi [[ session.user.profile.firstName ]]

APJ: Successfully Implementing Credential Tiering Using Zero Trust Privilege

Join this webinar to find out:
- What is credential tiering?
- Why is credential tiering a recommended control?
- How to mitigate the risk of credential-based attacks
- Centrify’s Zero Trust Privilege Management Solution
Recorded Jul 24 2019 54 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Presenter – Chris Owen, Director of Product Management, Centrify
Presentation preview: APJ: Successfully Implementing Credential Tiering Using Zero Trust Privilege

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Danger! High Vault-age!: Exposing the myths around passwords vaults Aug 21 2019 9:00 am UTC 45 mins
    Chris Owen, Director of Product Management, Centrify
    Join this webinar to find out:
    •How Password Vaults have evolved
    •The challenges in using today’s Password Vault solutions
    •How Centrify enables customers to operate without the overhead of legacy Vault solutions
    •The Zero Trust Privilege Management Approach
  • APJ: Successfully Implementing Credential Tiering Using Zero Trust Privilege Recorded: Jul 24 2019 54 mins
    Presenter – Chris Owen, Director of Product Management, Centrify
    Join this webinar to find out:
    - What is credential tiering?
    - Why is credential tiering a recommended control?
    - How to mitigate the risk of credential-based attacks
    - Centrify’s Zero Trust Privilege Management Solution
  • The Anatomy of a Hack: Perception vs. Reality Recorded: Jul 12 2019 56 mins
    Time Steinkopf, CEO Centrify, Andy Smith, VP Marketing, Centrify
    The anatomy of a hack has been glorified, leading to the common belief that data breaches require a tremendous amount of sophistication. However, post-mortem analysis has repeatedly found that the source of a hack is often due simply to compromised credentials.

    Watch Anatomy of a Hack: Perception vs. Reality webinar to learn about the 3 major phases of the “cyber-attack lifecycle” or “kill chain” and most importantly measures for preventing data exfiltration, including: Enforcing MFA; Using host-based auditing and monitoring; and Leveraging machine learning algorithms to monitor, identify, and alert on high-risk activity.
  • EMEA: Successfully Implementing Credential Tiering Using Zero Trust Privilege Recorded: Jun 18 2019 45 mins
    Chris Owen, Director of Product Management, Centrify
    Join this webinar to find out:
    •What is credential tiering?
    •The impact of credential-based attacks on users
    •How to mitigate the risk of credential-based attacks
    •How to effectively implement credential tiering using Centrify’s Zero Trust Privilege
  • Debunked: 5 Myths About Zero Trust Security Recorded: Feb 18 2019 60 mins
    Tony Goulding, Director of Technical Marketing, Centrify; Torsten George, Senior Director Product Marketing, Centrify
    In 2018, Zero Trust Security gained popularity due to its simplicity and effectiveness. Yet despite a rise in awareness, many organisations still don’t know where to start or are slow to adopt a Zero Trust approach.

    The result? Breaches affected as many as 66% of companies just last year. And as hackers become more sophisticated and resourceful, the number of breaches will continue to rise.

    Unless organisations adopt Zero Trust Security. In 2019, take some time to assess your company’s risk factors and learn how to implement Zero Trust Security in your organisation.

    Getting started is easy. Watch today to hear from Tony Goulding, Director of Technical Marketing and Torsten George, Senior Director, Product Marketing as they:

    - Review 4 essential pillars of Zero Trust Security
    - Debunk 5 major myths about Zero Trust
    - Share best practices to ensure a successful implementation
  • Zero Trust Security: How to Strengthen Your Security Posture Recorded: Sep 13 2018 20 mins
    Ian Stimpson, Systems Engineer.
    Zero Trust Security is quickly rising as a preferred alternative to traditional security approaches. Traditional security perimeters are no longer compatible with today’s business models as both corporate assets and users are increasingly outside the perimeter, while targeted, advanced threats are shifting inside.

    During this live webinar, our expert, Ian Stimpson, will provide a high level overview of the Zero Trust model and discuss some of the most pressing security issues facing organisations today. Ian will demonstrate how adopting a Zero Trust security approach can help you overcome these challenges and increase your security posture, whilst improving the user experience.

    Explore the Zero Trust approach to security and watch product demonstrations to learn how Centrify:

    Verifies the User, ensuring authenticity of every user before access to a resource is ever granted.

    Validates the Device, enabling access from trusted devices only, minimising endpoint threat vectors and increasing endpoint security posture.

    Limits Access and Privilege, minimising the attack surface, limiting lateral movement and reducing breach-related damage.
  • Rise above the Noise - Zero Trust from Centrify Recorded: Aug 17 2018 7 mins
    Rhonda Shantz, Centrify CMO and Bill Mann, Centrify Chief Product Officer
    There is a lot of noise in the market place, with over 100 companies talking about Zero Trust.

    However, there's only one company whose entire product line, and whose position in the market place is Zero Trust Security, and that's Centrify.

    In this 7 minute video, Centrify CMO Rhonda Shantz talks about the 'noise' in the market place, and how this is fuelling misconceptions as to what the real problem actually is, and why, despite billions of spending on cybersecurity, 66% of companies are still being breached.

    This is followed by a summary overview of the 4 pillars of the Centrify Zero Trust model; Verify the User, Validate the Device, Limit Access and Privilege and Learn and Adapt, delivered by Centrify's product experts.
  • Security, Privacy and the Next Generation Workforce (Podcast) Recorded: Aug 17 2018 30 mins
    Barry Scott, CTO Centrify EMEA
    Yahoo, Equifax and Uber are just some of the high-profile brands hit by breaches during the past twelve months but could it be younger workers that pose the biggest risk to an organisation's IT security?

    Centrify surveyed 1000 UK office workers aged 18 to 24 and 500 UK senior decision makers to measure what the decision makers think of the next generation workforce’s approach to security and compare it to real-world attitudes.

    Is there a significant gap between perception and reality in decision makers view of younger workers? The results may surprise you!

    In this podcast, Centrify's CTO Barry Scott and SC Media's Editor-in-Chief Tony Morbin discuss the next generation of workers and how their behaviour could impact the workplace.

    After listening to the podcast, don't forget to download the full report.
  • Zero Trust Security: Reduce Breaches, Complexity, and Cost Recorded: Jul 10 2018 34 mins
    Barry Scott, CTO EMEA
    More than 5 million data records are lost or stolen worldwide every single day, according to the Breach Level Index. That’s a staggering 59 records every second. According to the Ponemon Institute, to recover from these incidents, organizations spent on average $3.6 million per breach. It’s also worth remembering the potential for reputational damage that can create a downswing in an organization’s fortunes. For example, Yahoo!’s data breach proved very costly, wiping out $350 million off Verizon’s acquisition payment.

    Thus, it has become critical for organizations to find ways to reduce the risk of falling victim to a breach, as well as reduce complexity and cost in securing applications, devices, and infrastructure ― both on-premise and in the cloud.

    Join this webinar to learn:

    • How to assess the full impact of data breaches, ranging from direct costs, reputation damage, and customer loss to declines in revenue.
    • How misperceptions linked to the root cause of hacking-related breaches skew IT security spending and how to align your security investments to achieve higher effectiveness.
    • How the Zero Trust Security model can help shield your organization and its reputation from devastating and long-term financial consequences of a breach.
  • Zero Trust Security: Your Talk Track for the Boardroom Recorded: Jul 3 2018 41 mins
    Barry Scott, CTO Centrify EMEA
    More than 5 million data records are lost or stolen worldwide every single day, according to the Breach Level Index. That’s a staggering 59 records every second. With the scares of WannaCry and Petya, your board is asking, “what the hell are we doing to protect ourselves?” You need answers. The problem, highlighted in a recent WSJ study, showed that 62% of CEOs incorrectly cite malware as the primary threat to cybersecurity, whereas CIOs, CISOs, CTOs realize that 68% of breaches would have been prevented by identity security, vs. only 8% for anti-malware. In fact, the 2017 Verizon Breach Investigations Report found that 81% of breaches were due to lost, stolen or default passwords. 

    Your board wants to know what you’re doing about ransomware, but rather than randomly chasing the latest newsworthy incident. present a strategic Zero Trust Security plan that addresses the real issue and defines a practical and proven direction that not only protects against breaches, but also enables your business the freedom to transform and grow in spite of the growing threatscape. 

    Join this webinar to learn:
    • What is the real threat that must be addressed to protect you from breaches.
    • What is Zero Trust Security and how does it address the modern threatscape? 
    • Who else is talking about Zero Trust Security and what have they been able to achieve?
    • How to talk to your board about a consistent and strategic approach rather than reactive and defensive.
  • Centrify and Amar Singh at Infosecurity Europe 2018 Recorded: Jun 20 2018 12 mins
    Barry Scott, Centrify and Amar Singh, Cyber Management Alliance
    Join Barry Scott, Centrify and Amar Singh, Cyber Management Alliance live from Infosecurity Europe 2018
  • Zero Trust: The Importance of an Identity-Centric Security Approach Recorded: Apr 30 2018 38 mins
    Garrett Bekker, Principal Analyst, 451 Research and Bill Mann, Chief Product Officer, Centrify
    Today’s digital transformation initiatives have substantial consequences for a company’s overall security posture, potentially impacting both security architectures and attack surface. Traditional security perimeters are no longer compatible with today’s business models as both corporate assets and users are increasingly outside the perimeter, while targeted, advanced threats are shifting inside. Adopting a Zero Trust Security model centers on the belief that untrusted actors already exist both inside and outside the network, and that identities and endpoints must be verified and validated in order to grant conditional policies to govern access.

    Join Bill Mann, Centrify’s Chief Product Officer, and Garrett Bekker, Principal Analyst at 451 Research, in a lively discussion around how Zero Trust concepts can be applied to Identity and Access Management, empowering organizations to better secure and control access in an integrated and seamless fashion and ultimately limiting the risks associated with identity theft and cyberattacks.

    Attendees will also takeaway:
    •Top challenges and perspectives in implementing Zero Trust Security
    •The latest statistics on how breaches happen and why Zero Trust Security is important
    •Practical takeaways around how to start your Zero Trust Security journey with Next-Gen Access
  • WEBINAR WHY MEDIUM-SIZED ENTERPRISES SHOULD CARE ABOUT ZERO TRUST SECURITY Recorded: Apr 19 2018 51 mins
    Chase Cunningham, Forrester Principal Analyst and Corey Williams, Centrify Senior Director of Products
    While Zero Trust Security is quickly rising as a preferred alternative to traditional security approaches, medium-sized enterprises may perceive this strategic approach as being too complex, expensive or require unavailable skillsets to accomplish. Nothing could be further from the truth. Zero Trust Security is perhaps the best approach to simplify security, make it not only achievable but (relatively) affordable and allow you to get on with what you do best knowing that your security is up to date with the best thinking in the industry.

    Join guest speaker Chase Cunningham, Forrester Principal Analyst and Corey Williams, Centrify Senior Director of Products, to hear how the Zero Trust Security approach can be applied to any size enterprise.

    Chase and Corey will also discuss:
    •How a Zero Trust Security strategy is just what the medium-sized enterprise (security) doctor ordered
    •The fact that modern security technologies are easier than ever to acquire and deploy, especially for “born-in-the-cloud” organisations
    •How Next-Gen Access integrates many of the foundational capabilities you need to achieve Zero Trust Security
  • Next Gen Access defined for Zero Trust Recorded: Apr 12 2018 58 mins
    Chase Cunningham, Forrester Principal Analyst and Tom Kemp, Centrify CEO
    Zero Trust Security is quickly rising as a preferred alternative to traditional security approaches. The key enabling technology underlying the Zero Trust Security approach is Next-Gen Access which combines the key capabilities of such technologies as Identity as a Service (IDaaS), Enterprise Mobility Management (EMM) and Privileged Access Management (PAM). This integrated combination of capabilities underlies the key pillars of Zero Trust Security – verify every user, validate their devices and limit their access and privileges.

    Listen to our guest speaker Chase Cunningham, Forrester Principal Analyst and Tom Kemp, Centrify CEO, to hear how Next-Gen Access arose from the need to protect against the most common attack vector – compromised credentials.

    Chase and Tom will also discuss:
    •The importance of Next-Gen Access in combating today’s cyber threats
    •Tips on selecting and implementing Next-Gen Access in your organisation
    •The unique benefits of Next-Gen Access including reduced complexity and cost as well as better visibility and control
  • Simplify and Accelerate Your GDPR Compliance Efforts Recorded: Mar 13 2018 30 mins
    Tim Hill, Director of Product Management and Strategy
    As we’re all aware, GDPR will be enforced starting May 25th, 2018 and organisations should understand which aspects of its preparations will be in place before the deadline.

    Much like other technological shifts of the last decade —GDPR will change the way our organisation handles personal data. GDPR will require organisations to implement specific, defined controls over the handling of collected personal data, with the primary objective of streamlining data security regulations and bolstering data protection in the face of a fast-evolving technology landscape.

    Tim Hill, Director of Product Management and Strategy from Centrify, discusses best practices around frameworks and architectures needed to ensure better business process and data management.

    Tim will also cover how organisations with a strong IAM strategy in place are more likely to provide better notification and more openness if and when data has been compromised.

    Listen to this webinar and learn:

    - Key elements to consider as the deadline for GDPR approaches
    - How a strong IAM strategy enables organisations to quickly identify whose data they are responsible for and where its stored.
    - How Centrify’s Zero Trust approach to IAM can help you prepare for GDPR’s underlying policy goals.
  • Rethink Your Approach to Enterprise Security Zero Trust Update with Tom Kemp Recorded: Mar 13 2018 54 mins
    Tom Kemp, Co-founder & Chief Executive Officer, Centrify
    As today’s attacks become more sophisticated, the pressure to protect enterprise systems and data has grown considerably. Unlike the traditional security perimeter model, a Zero Trust approach dispels the notion of a robust firewall as the primary mechanism for protecting sensitive data. Zero Trust recognizes that any network, device, user or application could be compromised. As such, IT departments need to adjust their mindset and adopt a new way of thinking that bad actors are already in their environment in order to better protect sensitive company resources. Join Tom Kemp, Centrify CEO, to hear how identity has become the hub of any Zero Trust framework, and discover several guiding principles to help achieve a Zero Trust implementation.

    Centrify’s CEO, Tom Kemp will also discuss:
    •Centrify’s Identity platform that enables capabilities in achieving Zero Trust security
    •Steps for a company to jump start Zero Trust strategies
  • 5 Tips to Zero Trust Security Recorded: Feb 27 2018 57 mins
    Corey Williams, Senior Director of Product Management and Marketing, Centrify
    Cybersecurity is broken. Trust is the enemy. An entirely new approach is required — one based on Zero Trust. Championed by industry leaders including Google, Forrester, Gartner and Centrify, Zero Trust Security verifies every user, their device, and gives just enough access and privilege. Zero Trust Security continually learns & adapts to securely deliver access without boundaries.

    Join us for a live webinar to learn 5 tips on how to achieve Zero Trust Security.

    You will learn how Zero Trust will always
    •Verify the user by evaluating the authenticity of a user’s identity based on their location, device, and behaviour — beyond just a password.
    •Verify the device by only allowing access from known and trusted endpoints
    •Give just enough access by enforcing least privilege and only allowing access for a limited timeframe.
    •Learn and adapt by applying machine learning to automatically recognise out-of-the-ordinary behaviours.
    •Enable secure access without boundaries.
  • Privileged Access Security for AWS EC2 Instances - AWS Series #2 Recorded: Feb 27 2018 33 mins
    Tony Goulding, Director of Technical Marketing
    Organisations are extending their data centres to a hybrid cloud environment, with Amazon Web Services (AWS) quickly becoming one of the most popular IaaS options. But, they face the challenge of maintaining the same level of privileged access security that they currently have on-premises.

    In this webinar in our Securing Hybrid Clouds webinar part of an upcoming series, you’ll see an in-depth demonstration and hear how these areas benefit from Privileged Access Security for AWS EC2 Instances.
  • PIM Best Practices: Secure Access for Remote Admins and 3rd Party Vendors Recorded: Feb 19 2018 30 mins
    Tony Goulding, Director of Technical Marketing, Centrify
    Whether they're employees, outsourced IT, vendors or managed service providers – granting remote administrators privileged access to your infrastructure introduces risk.

    Join Tony Goulding, Director of Technical Marketing at Centrify to explore 5 best practices that will improve your risk posture, while you enable remote access for your privileged users. Specifically, Tony will demonstrate how to stop the breach with the following Centrify capabilities:

    •Federated privileged access for 3rd parties
    •Targeted access to infrastructure without a VPN
    •Host-enforced privilege elevation across Windows and Linux
    •MFA everywhere you need it
    •Host-based monitoring that can’t be bypassed
  • The Impact of a Data Breach on Share Value, Churn & Reputation. Ponemon Research Recorded: Feb 19 2018 61 mins
    Larry Ponemon – Chairman & Founder, Ponemon Inst.Corey Williams, Snr Director of Product Management & Marketing, Centrify
    The consequences of a breach ripple throughout the company causing reputation damage, customer loss, and declines in revenues. Recent data breaches cost Chipotle shareholders $400M and devalued Yahoo by $350M.

    Watch this on-demand webinar, to hear the result of a recent Ponemon research study to understand the impact of a data breach on share value, churn, and reputation.
Regular live & on demand webinars for CISOs and IT professionals
Centrify’s channel provides webinars that will inform and educate on Privilege Access Management. Centrify’s Zero Trust Privilege redefines legacy Privileged Access Management (PAM) for the modern enterprise IT threatscape. Organisations must discard the old model of “trust but verify”, which relied on well-defined boundaries. Zero Trust mandates a “never trust, always verify, enforce least privilege” approach to privileged access, from inside or outside the network.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: APJ: Successfully Implementing Credential Tiering Using Zero Trust Privilege
  • Live at: Jul 24 2019 7:00 am
  • Presented by: Presenter – Chris Owen, Director of Product Management, Centrify
  • From:
Your email has been sent.
or close