Moderated by Dr. Neil Daswani, Co-Director, Stanford Advanced Computer Security Program and former-CISO of LifeLock
In a world that has changed forever in the span of a few months, organizations have been forced into a digital transformation, whether or not they were ready for it. How will organizations manage their businesses and cyber risk in the current climate? More importantly, when this emergency has passed, will organizations make the right decisions when embracing “the new normal”, or fight it and try to go back to the way things used to be?
Dr. Neil Daswani, Co-Director, Stanford Advanced Computer Security Program and former-CISO of LifeLock
- Nimesh Mehta, CIO of National Life Insurance
- Ruben Vega, Director of IT Infrastructure at Unified Women’s Healthcare
- Jason Lish, CISO at Advisor Group
Lee Hutcheson, CISO at Bass Pro Shops | Bil Harmer, CISO and Chief Evangelist at SecureAuth
Join our latest live webinar as our CISO and Chief Evangelist, Bil Harmer, meets with Lee Hutcheson, CISO with Bass Pro Shops – a leading retail and manufacturing business - to discuss how he and his organization is deftly navigating the balance between security and user enablement for their distributed user environment to proactively support IT initiatives and drive business objectives.
You'll leave with a clear understanding of:
- How businesses and security leaders ensure users can securely access the appropriate tools and resources when and where they need
- Evolution of digital transformation is also introducing risk that security and risk management professionals must content with every day
- Security perimeters have changed and now extends beyond the office to include coffee shops, hotels, airports, home offices, and more
We look forward to seeing you there.
*Cant make this webinar time? Register and we'll send you a copy of the recording after the event.
Business and IT leaders are initiating digital transformation across the organization to accelerate strategic initiatives in order to drive competitive advantage, exceed customer expectations, and deliver business outcomes. A critical component to consider as part of any digital transformation journey is your approach to enterprise security. The data clearly demonstrates that passwords alone no longer provide the appropriate level of protection, nor confidence, required to secure valuable resources.
During this webinar, SecureAuth’s VP of Product Management, Rich Gibsen, will discuss the following:
1. Why passwords are expensive and easily compromised
2. Why two-factor authentication is not enough
3. How the evolution to passwordless is a journey
You’ll leave this webinar with a clear understanding of how to deploy a modern access management solution to improve security, increase efficiency, and enable passwordless authentication capabilities to truly protect your business.
Join us on World Password Day - Thursday, May 7th at 1:00pm ET/10:00am PT.
Bil Harmer, CISO and Chief Evangelist at SecureAuth
As businesses settle into a hybrid world of on-prem, public cloud, private cloud infrastructure with security delivered as a service and all of this overlaid with the concept to Zero Trust, what is left? Companies will have the data they are trying to protect and the identity of the user trying to access something. As life on the Net continues to develop, people are going to have multiple identities that will merge into a single identity with multiple profiles (work, play, family etc) while businesses continue to push MFA and eventually password-less access. The great question is how do manage things between now and then?
Rich Gibsen, CTO at SecureAuth and Robert Humphrey, CMO at SecureAuth
Digital experiences (portals, commerce sites, communities, etc.) are strategic resources for most organizations. Providing secure access to these experiences is a challenge for both security and business teams alike. While nearly all organizations are developing these digital experiences in the cloud, the typical IT infrastructure includes systems that are cloud based, on-prem or hybrid. Your identity access management systems should mirror your organization’s infrastructure and enable you to deploy on-prem, in the cloud or hybrid.
Hybrid Identity enables you to choose the deployment approach that fits your business, rather than fitting the approach of the vendor. Don’t compromise on experience and security, and don’t compromise on choice. Hybrid Identity gives you choice.
Join us to learn what Hybrid Identity is, and how it can help better secure all your workforce and consumer identities. You’ll see Hybrid Identity in action, and how it results in minimal impact to users with maximum visibility to administrators. You’ll also hear about SecureAuth’s latest offerings and get a sneak peek into the future of identity.
The Hybrid Identity journey is about to begin – sign up to find out how it can help better secure all your workforce and consumer identities.
Why passwords are a thin illusion of protection and what to do about it. Passwords have become nothing more than a thin illusion of protection. Human nature and human error are the weakest links in protecting organizations from cyberattacks and data breaches. Users choose poor passwords and then re-use them across multiple applications and systems, leaving them vulnerable to phishing and social engineering by bad actors. For years, users have been encouraged to create complex passwords and change them frequently.
It is time to remove human error from the equation.
The adoption of passwordless authentication protects against phishing attempts and minimizes the threat of stolen credentials. Passwordless technology generally combines: Multi-layered risk analysis that evaluates location, devices, access rights and typing sequences; Intricate yet convenient 2FA/MFA methods;
Biometrics and hardware authentication keys
Learn how passwordless authentication works and how it can help you increase security while reducing friction for your users.
Stephen Cox, Vice President and Chief Security Architect, SecureAuth
Mike McKinzie, Solutions Advisor, Swivel Secure
Office 365 (O365) is the most popular cloud service in the world - and one of the most attacked! 71% of organizations experience at least one compromised Office 365 account each month. Protecting this mission critical application and the sensitive data it stores must be a top priority.
Organizations using Office 365 need more than traditional approaches - even Microsoft’s native security - to protect their organization.
Learn best practices to:
•Secure access beyond traditional approaches
•Securely remove authentication disruptions for users based on risk
•Reduce labor expenses and readily gain user adoption
Data breaches have risen 480% within Financial Services firms. With the Financial Services industry being plagued by constant risks and regular threats, professionals need to be at the top of their game to thwart criminals.
Better breach protection begins with knowing more about the customers, partners, and/or employees requesting access to your systems. By analyzing multiple characteristics around devices, location, IP address, and behavior, organizations can elevate identity trust, remove authentication disruptions, make better access decisions, and even stop attackers with stolen credentials and ways around 2FA.
Attend this webinar to learn:
- Why passwords and 2FA give a false sense of security
- How multiple risk checks, including behavior analysis via machine learning, unmask would be attackers (even insider threats)
- When trust is high, you can securely remove user authentication steps
Breaches continue to litter headlines, increasing in volume and severity. To protect critical systems and assets from attack many organizations rely on two-factor authentication (2FA). But that may be resulting in a false sense of security.
Join SecureAuth as we explore how evolved attackers are working around popular 2FA methods. And we will demonstrate how behind-the-scenes adaptive risk checks of device, location, IP address, account type, and behavior can elevate identity trust and stop attackers cold! Even if they have stolen credentials and can bypass 2FA.
Better breach protection starts with better identity trust!
During this session you’ll learn how:
• Attackers are getting around two-factor authentication
• Risk and context checks can raise trust in identities and identify attackers
• Adaptive authentication delivers better access security without slowing down your business
Damon Tepe - Director, Product Marketing, SecureAuth
Jeff Hickman - Director of Sales Engineering, SecureAuth
SecureAuth, the secure identity company, provides the most advanced identity security solution for large organizations globally to enable secure access to systems, applications, and data. Our customers leverage our flexible, enterprise-grade identity and access platform coupled with the SecureAuth Intelligent Identity Cloud service to deliver the most secure, frictionless user experience for their customers, partners and employees, everywhere, exponentially reducing the threat surface, enabling user adoption and meeting business demands. To learn more, visit www.secureauth.com, or connect with us at email@example.com, Twitter, and LinkedIn.
New SecureAuth Solution: Deployment Freedom, Simple Admin, and Enhanced SecurityDamon Tepe, Director of Product Marketing at SecureAuth[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]30 mins