Hi [[ session.user.profile.firstName ]]

The Power of Choice- Identity Governance for Your Modern Enterprise

Today’s modern enterprise is experiencing rapid change as digital transformation initiatives drive adoption of cloud-first strategies, reduction of infrastructure and capital expenditures, and new solutions to overcome the lack of skilled staff. To help ensure a secure and compliant environment, organizations are looking to harness the power of an identity platform to empower users and govern their access to all applications and data across their hybrid IT environment. Finding the best identity solution includes having the freedom to choose from a deployment option that best aligns with your infrastructure strategy; including SaaS, public cloud, data center, or from a trusted managed service provider.
Recorded Jul 18 2018 29 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Kevin Cunningham, Chief Strategy Officer & Co-Founder SailPoint Mike Siegel, VP Business Development SailPoint
Presentation preview: The Power of Choice- Identity Governance for Your Modern Enterprise

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
    Robert Hanigan, Former Director GCHQ, The World’s Leading Cyber Security Agency
    Industry 4.0 is otherwise known as the fourth industrial revolution. It is another step change in reducing cost and speeding up delivery. Today, manufacturing organisations are already challenged to provision/control user access across ERP instances and production line systems for employees or third parties.

    Advanced digital technology is already used in manufacturing, but with Industry 4.0, it will transform production but will also provide more targets for cyber threat actors with the addition of cloud-based applications, RPA bots, and advancements in AI across networked robots and mobile robots. These changes in the enterprise also makes it more difficult to meet SOX access controls and other regulated access rules. Given that nearly all breaches involve a compromised credential, it is critical to have exacting controls over who gets access to what.

    This exclusive session with Robert Hannigan, will show that with the increased connectivity and use of standard communications protocols that come with Industry 4.0, the need to protect critical industrial systems and manufacturing lines from cybersecurity threats increases dramatically. As a result, secure, reliable communications as well as sophisticated identity and access management of machines and users are essential.
  • Security Best Practices in a Cloud Based Workforce Recorded: Jul 2 2020 16 mins
    Donovan Blaylock
    Old school security wisdom in an age of rapid digital transformation: IT and Access Security best practices are tried and true. We know how to eliminate the vast majority of threats that face a corporate enterprise. However because of the speed and complexities with digital transformation and cloud adoption these are often not easily adhered to. We will focus on one specific use case; Applying least privileged to your IaaS infrastructure. This will highlight why this is not being performed today and map out how to bring many best practices into your cloud strategy.

    Speaker Bio: Donovan Blaylock is the Emerging Technology Evangelist for SailPoint. SailPoint provides Identity and Access Governance globally for organizations looking to effectively manage user’s access to Infrastructure, Applications and Data throughout the enterprise. He has held several positions within the company previously ranging from engineering to sales and helped to found the Healthcare and Government Verticals for the company. Previous to SailPoint, he spent over 14 years in the US Defense and Federal government space working on some of the largest identity management systems worldwide. Donovan grew up in Washington, DC but now calls Austin, TX home. He spends a lot of his spare time involved in technology roundtables, startup social events, and enjoying the famous live music scene that the city is known for. All of his remaining time is spent with his two children, travelling the globe and taking on a new woodworking projects in his woodshop.
  • Data Privacy in 2020 and Beyond Recorded: Jun 17 2020 60 mins
    Mali Yared, Robert Razavi, Baber Amin, Lori Robinson & Elliot Dellys
    Is your organization aware of the main differences in data regulations around the world?

    Join this panel of industry leaders for an interactive Q&A roundtable to get a comprehensive look into the different data privacy and security requirements. The panel will also discuss what to expect in 2020 and beyond.

    Viewers will learn more about:
    - What's new on the data privacy and compliance landscape
    - Main differences between data regulations around the world and what this means for your organization
    - Expert recommendations regarding best tools and practices for achieving and maintaining compliance
    - The future of data privacy
    - What to expect in 2020 and beyond

    Mali Yared, Practice Director, Cybersecurity and Privacy, Coalfire (Moderator)
    Robert Razavi, Senior Security Architect CTO Office, IBM Canada
    Baber Amin, CTO West, Ping Identity
    Lori Robinson, Sr. Director, Product & Market Strategy, SailPoint
    Elliot Dellys, Director, Strategic Consulting, Trustwave
  • A Musical Journey To The True Power of Predictive Identity Recorded: Jun 16 2020 33 mins
    Mike Kiser : Strategist and Evangelist, Office of the CTO, SailPoint
    Great music does not spring out of nothingness. In the hands of a talented producer, trivial melodies become emotionally powerful works of art. Identity plays a similar role with the continuing adoption of cloud networks, weaving disjointed tasks into a coherent whole. We’ll learn from Sting and The Police as we explore how identity can help overcome security challenges within our organizations; just as they overcame obstacles to creating a musical masterpiece. We’ll map out how to use the same tactics to break through implementation barriers as we protect key resources and create new business opportunities.

    As we examine their musical process, we’ll see how to transform your identity program from isolated actions into a cohesive whole, using emerging technologies to build a new model for identity—one that can distill complex cloud environments into a simple and governable infrastructure. This not only improves current identity governance efforts, but also to see what will happen in the future: in short, we will take a musical journey that will show us the true power of predictive identity.

    Attendees will learn:
    (1) How identity can be used to gain visibility into multi-cloud environments and integrate these new arenas into a security strategy
    (2) How to utilize identity in the aggregate to identify areas of “normality” and how to triage potential outliers as threats
    (3) How to preemptively adapt to change by predicting future shifts in identity patterns
  • Tambellini Group Study: Security Gaps in Higher Education Uncovered Recorded: May 14 2019 63 mins
    Michigan State University and the Tambellini Research Group
    MSU’s CISO to Discuss the Effects of Underutilizing Identity

    Did you know higher education is the third most likely source of a data breach?

    What about that cybersecurity is the top concern for higher education IT professionals?

    Institutions must constantly balance safeguarding sensitive information while maintaining an open, collaborative culture for users accessing applications and files.
  • 3 Dozen Reasons Why Identity is Key to Aligning with NIST's CSF Recorded: Apr 23 2019 50 mins
    SailPoint Technologies
    How confident are you in your security and compliance programs?

    Falling short of complete compliance with the myriad of security and privacy regulations can result in significant consequences, and failing to implement the right security controls, in the right place, and in the right way, creates risk.

    To efficiently and effectively maintain compliance and manage risk, both government agencies and commercial enterprises are increasingly looking to NIST’s Cybersecurity Framework to provide the necessary guidance. One of the critical elements for aligning with NIST is the use of identity governance platforms to govern access to sensitive information.

    Find out how government agencies and commercial enterprises can apply this technology to streamline their compliance initiatives, while reducing the cost and effort associated with aligning to the NIST Framework.

    In this live webinar presentation, you can expect the following takeaways:
    - Better understand the NIST Cybersecurity Framework approach to security and compliance
    - Learn why aligning with NIST’s Framework increases operational efficiency and efficacy
    - Discover how identity addresses 3 dozen critical subcategories in the NIST Framework
  • 2019 Make-or-Break CIO Priority List Recorded: Apr 23 2019 43 mins
    SailPoint Technologies
    Being a CIO is not an easy responsibility. There are countless challenges to overcome, especially as organizations continue to adopt new technologies and evolve their business capabilities. In addition to the digital transformation many enterprises are now undergoing, and the new security threats they face on a daily basis, determining the most critical priorities as a CIO is a daunting task.

    No matter how you support your organization’s security and information system landscape, whether you’re a CIO or not, it’s important to know what will make-or-break the coming year.

    Tune into this webinar to hear from SailPoint's CIO, Kevin Hansel, to get his views on:
    - Why CIOs must continually adapt to keep up with today’s business environment
    - Why IT needs to innovate faster than ever
    - How partnering with the CISO leads to success
    - How identity can enhance your security and risk management posture
  • The 5 Myths of Identity Governance Recorded: Feb 6 2019 34 mins
    SailPoint Technologies
    Today, identity governance is consistently one of the top priorities of CIOs.

    A successful identity program can empower users while addressing the growing security and regulatory landscapes.

    Over the past 10 years, identity governance has guided organizations navigating the digital transformation. Yet, many enterprises are just beginning their identity journey, and confusion persists about what it is and is not.

    During this webinar, we will debunk 5 Identity Governance Myths, and learn the real truths behind them. And importantly, the value that identity governance can deliver to your organization.

    Tune into the webinar to:

    - Decipher what identity governance is and what it is not
    - Debunk 5 identity governance myths and discover the real truths behind them
    - Understand the value identity governance can deliver to your organization
  • Thinking about Security AND Compliance? Think Identity! Recorded: Feb 1 2019 56 mins
    SailPoint Technologies
    Here is your reality: Your business is growing. Your users are demanding new apps and technology daily. Data privacy and other regulations are intensifying. The risk of a data breach is ever present.

    What should be your focus today: Security, growth, or compliance?

    Maybe you do not have to choose.

    Identity governance bridges the gap between risk, compliance and productivity. This webinar will explain the fundamental role that identity plays in securing access to your most sensitive data, while ensuring your audits are a success and keeping your users productive with new applications. And if you think identity governance is too complex for you and your staff, think again!

    In the webinar you’ll learn:
    - Why identity is foundational to strong security
    - Ways to quickly simplify compliance efforts
    - How to greatly increase productivity throughout the business
  • The 2018 Identity Report – The Identity Industry’s First Benchmark Recorded: Jan 30 2019 32 mins
    SailPoint & Identropy
    Based on answers from hundreds of technology professionals just like you, SailPoint has created the industry’s first comprehensive benchmark report on the state of identity governance today. In this webinar, we’ll review the results from our in-depth analysis of hundreds of Identity Scores and the themes those scores have brought to light with regards to how well organizations are doing in their identity efforts.

    Watch this webinar as SailPoint and Identropy:
    - Discuss the benchmark report findings
    - Explain what organizations can do to improve their security strategies
    - Share insights and give best practices
  • The New Frontiers of Identity Recorded: Jan 1 2019 34 mins
    SailPoint Technologies
    Don’t Fear Digital Transformation. Embrace It With Identity Governance.

    Our world is always evolving, and organizations are racing to keep up. Digital transformation is only increasing the complexity enterprises are managing, and while it has opened new paths to success, it’s also created new frontiers for identity governance that must be addressed.

    All organizations – no matter their size or stage in their digital transformation – need to be able to secure access for all users across all applications and all data, especially as new frontiers of identity take shape, including:
    - Non-human identities
    - Cloud platforms and applications
    - Unstructured data stored in files

    Register today to learn how you can take a comprehensive approach to identity governance, including the new frontiers.
  • KuppingerCole Webinar: The Power of Identity Context and How AI will Help Recorded: Jan 1 2019 55 mins
    Each one of us has a set of identities that accompany and become relevant in different parts of our lives at different stages. The same is true about the identities in your organization – without proper identity context, you are not able to effectively lower cost, get your employees access to what they need and reduce risk. 

    However, getting the right context is not a simple task. While there is some information on hand, once a user has authenticated, the less connected he or she is to the organization, the less you will know. But to make the right decisions about who is allowed access to what, about where fraudulent access is happening, or where to increase your controls, you need context – the right amount of information to focus your work and make better decisions. This is where identity context comes into play, and where AI (Artificial Intelligence) and ML (Machine Learning) can help you become more efficient, provide a better user experience, and lower risk.

    In this webinar, you will learn more about:
    - Why we need AI and ML for Identity and Security
    - What identity context is about – and how to gather the required information
    - A brief history of identity context - Problem and Solution
    - The Identity Utopian Trifecta - Cost, Access, Risk
    - Identity context throughout your IT infrastructure
    - How to improve access to data stored in files with Identity Context, AI, and ML

    In the first part of the webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will talk about the potential AI and ML deliver to Identity and Security, helping to better deal with information and focus the rare human resources on the critical items.

    In the second part, Kelly Grizzle, Senior Architect, SailPoint IdentityAI, will provide a more detailed overview about Identity Context and the potential this provides for optimizing the way we work today in Identity and Access Governance.
  • Kublai Khan, Blockchain & The Democratization of Identity Recorded: Oct 11 2018 50 mins
    SailPoint Technologies
    Blockchain is already rife within the consumer world today. It has become the new independent federation of nations, not centralized but distributed. Could blockchain be equally effective within a B2B environment for securing the assets of the future? If so, what would it look like, how would we make it work, and what benefits would we see? Join SailPoint to discuss whether blockchain will revolutionize identity management.

    SailPoint’s CTO and CISO Darran Rolls discusses:
    - Where and how blockchain-related technology fits with identity management
    - How to evaluate blockchain’s potential impact on identity validation
    - Future scenarios where blockchain and identity management use cases may overlap
  • Taming the Tsunami of Bots, Apps, and Cloud using the Power of Identity Recorded: Oct 11 2018 39 mins
    SailPoint Technologies
    The rapid adoption of software bots, cloud applications and cloud infrastructure has created new security gaps and issues for enterprises due to lack of proper access and governance controls. Using the power of identity, organizations can tame this unyielding tsunami into a wave that will propel you forward to realize a more secure, compliant and efficient infrastructure.

    SailPoint IdentityIQ 7.3 is continuing to push the boundaries of innovation by extending identity for all users, across all applications and data, reducing your organization’s risk profile while ensuring your identity governance strategy is always one innovation ahead.

    Watch this webinar to:
    - Manage, govern and control all digital identities including software bots and Robotic Process Automation (RPA)
    - Accelerate business value with rapid setup and application onboarding
    - Govern AWS and SAP platforms, from a single pane of glass
    - Deploy IdentityIQ in the datacenter or in a hosted cloud environment such as Amazon AWS or Microsoft Azure
  • The Must Do’s for Securing Health Data Files Recorded: Oct 11 2018 45 mins
    SailPoint Technologies
    How confident are you in your ability to secure health data and other highly-sensitive information stored in applications and files? By combining identity governance and data access governance capabilities, provider organizations can significantly enhance their ability to thwart health data breaches. To learn how integrating these capabilities can improve your cybersecurity posture, join SailPoint and Identropy on a live webinar presentation.

    In this webinar, expect the following key takeaways:
    - Discover an how to identify sensitive data stored in files
    - Understand risky permissions and access models
    - Learn an effective approach for applying security policies and controls
    - Explore strategies for complying with regulations (HIPAA, GDPR, etc.)
  • Houston, We Have a Problem: Sensitive Data Orbiting Your Business Recorded: Aug 15 2018 28 mins
    Mike Kiser, Sr. Security Strategist, SailPoint
    Similar to space debris, data is orbiting enterprises at an alarming speed and volume. Like many of the floating objects in space, much of this data is abandoned, forgotten, and dangerous. Sensitive data lurking in unstructured systems can wreak havoc enterprises when left unmanaged. To deal with this problem, enterprises must extend their identity governance programs to data stored in files before hackers find and exploit it. Thankfully, the tools and the processes are the same well-known practices already used by identity professionals today. Taking cues from the global initiative to address the problem of space debris, find out how to extend your identity governance program into the new frontier of data.

    Join this live webinar to:

    • Understand the risk posed by sensitive data in files that often goes undetected and ignored, just like space debris.
    • Learn how to identify and triage sensitive data in files, diagnosing the risk posed to your organization.
    • Discover how to develop a clear roadmap that can help mitigate the risk posed by sensitive data.

    Can't make the webinar? Register anyway, and we'll send you the recording to view on-demand.
  • The Power of Choice- Identity Governance for Your Modern Enterprise Recorded: Jul 18 2018 29 mins
    Kevin Cunningham, Chief Strategy Officer & Co-Founder SailPoint Mike Siegel, VP Business Development SailPoint
    Today’s modern enterprise is experiencing rapid change as digital transformation initiatives drive adoption of cloud-first strategies, reduction of infrastructure and capital expenditures, and new solutions to overcome the lack of skilled staff. To help ensure a secure and compliant environment, organizations are looking to harness the power of an identity platform to empower users and govern their access to all applications and data across their hybrid IT environment. Finding the best identity solution includes having the freedom to choose from a deployment option that best aligns with your infrastructure strategy; including SaaS, public cloud, data center, or from a trusted managed service provider.
  • How GE Built a Scaleable Identity Governance Program Recorded: Jul 18 2018 49 mins
    Paul Trulove, CPO SailPoint Matt Powell Sr. Application Engineer GE Tiffany Samuel Sr. Tech Product Manager GE
    In support of their ongoing digital transformation, the Identity & Access Management team at GE has been on a journey from a complex decentralized model of 9 independent identity teams and platforms to a simplified and centralized ‘OneIdM’ service offering powered by SailPoint IdentityIQ.
  • Identity is Security Recorded: Jul 17 2018 36 mins
    Juliette Rizkallah, CMO SailPoint
    Times are changing: data breaches are more frequent and damaging, and the regulations (like GDPR) that help combat them carry both great requirements and consequences. Your organization’s security just isn’t complete without identity governance. With breaches frequently targeting enterprise users instead of their network and endpoints, it’s more important than ever for IT leaders to recognize that identity is security.
  • Power-up your Access Management with Identity Governance Recorded: Jul 17 2018 29 mins
    Mike Kiser, Senior Security Strategist David Lee, Identity Strategist, Office of the CTO
    Today’s organizations are utilizing the benefits of access management to balance ease of access to a variety of cloud and on-premises applications from anywhere, on any device. While this enables users with 24/7 access, it also creates a large attack surface that is prime to be compromised. With 77% of data breaches involving an insider, it has become necessary to ensure access to all corporate resources is secured and governed.

    By leveraging the power of identity governance with access management, you can now institute an identity-aware solution that securely and effectively authenticates, provisions and governs access to all applications and data across the enterprise ensuring adherence to corporate policies and security requirements.
Rethink Identity
The leader in identity management, SailPoint helps the enterprise ensure that everyone and everything has the exact access they need, exactly when they need it, intuitively and automatically. Powered by patented Artificial Intelligence (AI) and Machine Learning (ML) technologies, the SailPoint Predictive Identity platform is designed to securely accelerate the business while delivering adaptive security, continuous compliance and improved business efficiency.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Power of Choice- Identity Governance for Your Modern Enterprise
  • Live at: Jul 18 2018 6:30 pm
  • Presented by: Kevin Cunningham, Chief Strategy Officer & Co-Founder SailPoint Mike Siegel, VP Business Development SailPoint
  • From:
Your email has been sent.
or close