Passwords today are increasingly complicated, easy to forget and — worst of all — leave companies vulnerable.
Fortunately there’s a better solution. “Passwordless” is a broad authentication strategy that solves a wide range of authentication, security, user experience, and support problems. Okta’s passwordless solutions can secure authentication with a single click. Goodbye passwords.
RecordedApr 21 20201 min
Your place is confirmed, we'll send you email reminders
When the pandemic shut down most offices, teams with Range — a diverse set of skills and experience that allow them to adapt to disruption and change — were hardwired to succeed. Key is the ability to successfully improvise as a team — an invaluable skill when it comes to navigating turbulent times or uncharted waters. In this deeper dive into his #1 New York Times Bestseller, Range, David Epstein reveals how generalists not only triumph as individuals but are essential to high-performance teams that innovate, unleash creativity, make sound decisions in the face of uncertainty, demonstrate resiliency and respond successfully to challenges and difficulties. Cultivating these qualities in both your teams and your organizational culture is invaluable in both the remote workplace, the “old normal” office, or, as we develop hybrid teams working both in-person and remotely.
As a critical building block of a true Secure Access Service Edge (SASE) architecture, Zero Trust Data Protection delivers security based on context and continuous risk management, allowing conditional access controls to be defined based on data sensitivity, app risk, user behavior risk, and other factors.
Join Netskope and Anthem to learn why data protection is about context, managing data access based on who the user is and what the user is trying to do. Learn how to apply Zero Trust principles to update ineffective approaches to DLP, protect data in the cloud, and make the right investments to achieve the most effective SASE architecture for networking and security.
Customers today expect and demand a modern, seamless, personalized, customer experience at every touchpoint. Organizations that fail to deliver such an experience will be unable to attract and retain new and existing customers.
How can you deliver that modern, seamless, personalized, customer experience?
Which role does Customer Identity & Access Management (CIAM) play in this?
How to build authentication, authorization & clear user management into any customer-facing app, portal or page?
How to keep the balance between customer experience vs. security and compliance?
Build or buy a CIAM Solution?
While many organizations use AD as the authoritative source for provisioning, this model is becoming dated. It often relies on brittle, patchworked, intermediate processes to get data and signals from the real source of truth: HR systems. Why not drive provisioning directly from HR? This has many benefits: increased productivity, strengthened security, and better compliance. Join this session to learn about best practices, typical setups, and recent enhancements in HR-driven IT Provisioning.
In this talk, you will discover how to design secure (and friendly) user experiences when developing your software applications. We will cover best practices in the industry that make an authentication experience easier for users to accept, what things to avoid, and how humans think about security, in general, to make your app a 10 out of 10.
The explosion of mobile and cloud technologies has dissolved the traditional perimeter. People – and their identities – are now the single control point across users, devices, and networks. Identity is the foundation of a Zero Trust strategy, ensuring only the right people have access to the right resources.
Zero Trust has been a hot topic for some time now, and many say it’s even starting to enter buzzword territory. But when putting it into practice:
Is it actually achievable?
Are organizations explicitly going down a Zero Trust path?
What technologies are being implemented during Zero Trust journeys?
And what steps are they taking to implement a Zero Trust architecture?
Benjamin Doyle, Brent Maher, Arun Shrestha, Melek Somai
Derive key insights from Okta-BeyondID joint customers as they discuss how modern identity helps them adapt to the challenges a digital-first world. This session will focus on how to accelerate business transformation in a way that keeps cybersecurity and excellent digital experiences as top priorities. Learn about each digital transformation journey, as we cover both common and unique challenges, roadmaps, strategy, and successes and lessons learned.
Security tokens such as JWTs are now commonplace in developer guides and documentation. They are a key part of securing mobile and web applications. Why is this? What benefits do they provide? How should you use them in your applications? In this talk, you'll learn what security tokens are, how to use them, and how to abuse them. >:) Along the way, you'll learn the differences between the three most popular types of security tokens: JWTs, Macaroons, and PASETO, and when to use (and not use!) them.
The separation of physical and digital worlds leaves IT systems vulnerable to physical security breaches; today’s world requires a more holistic approach to security. This is true more than ever before, as the surge in remote working in 2020 has teams logging in from home in many locations, while their physical workplaces have less regular attendance that’s now moved to a scheduled rotation for teams to comply with social distancing density requirements. In their global deployment, Intercom uses Okta and Openpath to bridge the gap between physical and digital security, providing a frictionless and secure user experience regardless of where users are. Leveraging the open API architecture Openpath provides, Intercom was able to combine access control with their security suite including Openpath’s native integration with Okta to automatically sync users across the system making it quick and easy to issue or revoke credentials for both an improved security posture and an increased ROI. Giving customers the ability to synchronize users in real-time not only results in fewer vulnerabilities for physical access to locations, but also helps make sure that as new employees onboard in the company, they have quicker and more immediate access to the physical buildings they work in.
While organizations are accelerating their digital transformations at an unprecedented pace, the steep rise in data security breaches and the spread of mis/dis-information are gradually contributing to the erosion of customer trust. Matt Gorham (MD in PwC's Cyber Innovation Institute and Former Assistant Director, FBI's Cyber Division) and Bob Moore (Co-leader for PwC's Cloud Engineering and Security Hub) will join Sean Joyce (Global and US Leader for PwC's Cybersecurity, Privacy, and Forensics), to offer insights into the role that Security Executives play in rebuilding customer trust in this complex Threat environment.
Organizations are digitizing their products and services now more than ever. And are transforming their IT landscapes into a hybrid one by adding cloud components. Hybrid IT is not going away—if anything it’s expanding and becoming more complex as companies adapt to modern challenges. That’s why securing and expediting IT transformation is very important.
However, that’s easier said than done. Questions may rise like:
How to centralize user management and access while modernizing IT?
How to eliminate IT disruptions?
How to provide frictionless end user experiences?
How to secure access for your global workforce
And which role do Identity & Access Management play in all this?
Liesbeth Kempen, Bart Zuidgeest & Ronald van de Pol
Every organization had to adapt their business in 2020. Those that leaned into the Zero Trust security model and broad cloud adoption were rewarded with a more secure and agile workforce.
How did these companies quickly adapt to the new normal of working from home quickly and securely?
How did these companies meet the demands of the modern digital workforce?
What is their long term strategy for securing their users?
And what role do technologies like Adaptive MFA, SSO, Provisioning, lifecycle management and workflows in all this?
Nearly all organisations today leverage at least one cloud data platform. The cloud’s flexibility, cost effectiveness, and speed to data insights offers a substantial competitive edge that organizations would be foolish to forgo. But the future of data analytics isn’t just the cloud — it’s many cloud services.
Immuta’s recent survey of data professionals revealed a trend that may not come as a surprise: Organizations are adopting more than one cloud data platform, and in doing so, aim to operationalize sensitive data for analytics. But if the trend isn’t surprising, its implications — and its timeline — are.
Sensitive data use, cloud data platform adoption, and regulatory enforcement and evolution are converging faster than analysts predicted, meaning that existing obstacles to managing access to data will grow quickly and exponentially across multiple cloud platforms. Data teams that want to stay competitive must be prepared.
Join Paige Bartley, Senior Research Analyst at 451 Research, Ryan Naughton, Co-Executive Director at the Center for New Data, and Sumit Sarkar, Senior Director of Product Marketing at Immuta for a session discussing:
- The key challenges data teams face in managing data access governance in a cloud data ecosystem.
- Tactics for mitigating risk of unauthorized access and/or use of sensitive data across multiple cloud data platforms.
- How the Center for New Data securely operationalizes sensitive data for analytics across multiple cloud platforms in order to help stop the spread of COVID-19.
Bryan Glick, Editor-in-Chief at Computer Weekly, and Max Faun, Head of EMEA Consulting at Okta
Identity and access management (IAM) is becoming an increasingly important part of an effective cybersecurity setup – enabling organizations to provision (or revoke) access to sensitive data, applications or environments.
In this Computer Weekly video, join 2 distinguished security experts as they discuss:
The common challenges surrounding IAM implementation
Key considerations for achieving effective customer IAM
When it comes to identity and access management (IAM), most of the benefits and use cases highlight favorable outcomes from the organization’s perspective – but how will IAM affect the user experience?
In this video, join Bryan Glick, editor-in-chief at Computer Weekly, as he discusses the role of IAM for users on online interactions. Watch now to get started.
Identity management plays a critical role in an organization’s ability to provision access and protect sensitive data – especially when users are remote.
In this video, join Bryan Glick, editor-in-chief at Computer Weekly, as he discusses:
The security challenges that organizations are facing – particularly as it relates to the current pandemic
Adjusting to the ‘new normal’ – working from home, remote communications, etc.
The importance of identity in securing your business
Bryan Glick, Editor-in-Chief at Computer Weekly, and Max Faun, Head of EMEA Consulting at Okta
In this video, join Bryan Glick, Editor-in-Chief at Computer Weekly, and Max Faun, Head of EMEA Consulting at Okta, as they discuss the growing importance of securing and managing identities for modern organizations, focusing on:
The role of IT directories
Directory- & identity-specific security challenges
Tools & best practices for optimizing your IT directory
If your organization has been through a merger or acquisition, then you already know the challenges that come with bringing together multiple different IT systems.
This ComputerWeekly.com video with Editor-in-Chief, Bryan Glick, reviews the specific challenges that come with bringing together two organizations’ identity management systems – especially directories.
Tune in to learn how you can ease the challenges of managing all the information on internal and external identities.