Hi [[ session.user.profile.firstName ]]

GDPR + Customer Identity: The Journey to Compliance

Consumer-facing enterprises have long been stewards of customer identity data, storing sensitive attributes ranging from a customer’s name, to credit card numbers and home addresses.

But with the ever increasing number of data breaches, privacy concerns, and misuse of data, lawmakers are stepping in to arm data regulation with teeth. In the European Union, the General Data Protection Regulation (GDPR) was the first step taken to set a new standard for data privacy.

In the race to become GDPR compliant, many companies have adopted manual processes for handling GDPR requirements such as customer requests for profile information and the right to be forgotten. As these organizations embark on the journey of continual data privacy compliance with more regulations being proposed and enacted, enterprises must take a second look at automating, securing and future-proofing their infrastructure.

In this webinar, learn how a modern customer identity and access management (CIAM) solution can facilitate privacy compliance while reducing costs to support manual processes, improving the customer experience and making companies more secure.
Recorded May 12 2020 38 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Swaroop Sham, Senior Product Marketing Manager, Okta
Presentation preview: GDPR + Customer Identity: The Journey to Compliance

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Developing High Performance Teams in the Remote Workplace Aug 27 2021 1:00 pm UTC 44 mins
    David Epstein
    When the pandemic shut down most offices, teams with Range — a diverse set of skills and experience that allow them to adapt to disruption and change — were hardwired to succeed. Key is the ability to successfully improvise as a team — an invaluable skill when it comes to navigating turbulent times or uncharted waters. In this deeper dive into his #1 New York Times Bestseller, Range, David Epstein reveals how generalists not only triumph as individuals but are essential to high-performance teams that innovate, unleash creativity, make sound decisions in the face of uncertainty, demonstrate resiliency and respond successfully to challenges and difficulties. Cultivating these qualities in both your teams and your organizational culture is invaluable in both the remote workplace, the “old normal” office, or, as we develop hybrid teams working both in-person and remotely.
  • How to Achieve Zero Trust Data Protection in the Cloud Aug 27 2021 1:00 pm UTC 40 mins
    Jason Clark, Dustin Wilcox
    As a critical building block of a true Secure Access Service Edge (SASE) architecture, Zero Trust Data Protection delivers security based on context and continuous risk management, allowing conditional access controls to be defined based on data sensitivity, app risk, user behavior risk, and other factors.

    Join Netskope and Anthem to learn why data protection is about context, managing data access based on who the user is and what the user is trying to do. Learn how to apply Zero Trust principles to update ineffective approaches to DLP, protect data in the cloud, and make the right investments to achieve the most effective SASE architecture for networking and security.
  • The Future of Customer Identity Aug 26 2021 1:00 pm UTC 54 mins
    Marc de Koos, Vincent Philipsen & Frank Benus
    Customers today expect and demand a modern, seamless, personalized, customer experience at every touchpoint. Organizations that fail to deliver such an experience will be unable to attract and retain new and existing customers.

    How can you deliver that modern, seamless, personalized, customer experience?
    Which role does Customer Identity & Access Management (CIAM) play in this?
    How to build authentication, authorization & clear user management into any customer-facing app, portal or page?
    How to keep the balance between customer experience vs. security and compliance?
    Build or buy a CIAM Solution?
  • Drive Provisioning from Your HR System to Modernise On/Offboarding Aug 26 2021 1:00 pm UTC 40 mins
    Ryan Bradley, Tarell Evans, Lee Murray
    While many organizations use AD as the authoritative source for provisioning, this model is becoming dated. It often relies on brittle, patchworked, intermediate processes to get data and signals from the real source of truth: HR systems. Why not drive provisioning directly from HR? This has many benefits: increased productivity, strengthened security, and better compliance. Join this session to learn about best practices, typical setups, and recent enhancements in HR-driven IT Provisioning.
  • Building an Auth Experience for Humans Aug 25 2021 1:00 pm UTC 28 mins
    Heather Downing
    In this talk, you will discover how to design secure (and friendly) user experiences when developing your software applications. We will cover best practices in the industry that make an authentication experience easier for users to accept, what things to avoid, and how humans think about security, in general, to make your app a 10 out of 10.
  • How to increase Zero Trust maturity? Aug 24 2021 1:00 pm UTC 55 mins
    Mark van Tiggel, Bart Cools & Joshua Kroez
    The explosion of mobile and cloud technologies has dissolved the traditional perimeter. People – and their identities – are now the single control point across users, devices, and networks. Identity is the foundation of a Zero Trust strategy, ensuring only the right people have access to the right resources.

    Zero Trust has been a hot topic for some time now, and many say it’s even starting to enter buzzword territory. But when putting it into practice:

    Is it actually achievable?
    Are organizations explicitly going down a Zero Trust path?
    What technologies are being implemented during Zero Trust journeys?
    And what steps are they taking to implement a Zero Trust architecture?
  • Securely Accelerate Digital Transformation + CX Through Modern Identity Aug 24 2021 1:00 pm UTC 44 mins
    Benjamin Doyle, Brent Maher, Arun Shrestha, Melek Somai
    Derive key insights from Okta-BeyondID joint customers as they discuss how modern identity helps them adapt to the challenges a digital-first world. This session will focus on how to accelerate business transformation in a way that keeps cybersecurity and excellent digital experiences as top priorities. Learn about each digital transformation journey, as we cover both common and unique challenges, roadmaps, strategy, and successes and lessons learned.

    Sponsored by BeyondID
  • JSON Web Tokens, Macaroons, and PASETOs, Oh my! Aug 23 2021 1:00 pm UTC 30 mins
    Brian Demers
    Security tokens such as JWTs are now commonplace in developer guides and documentation. They are a key part of securing mobile and web applications. Why is this? What benefits do they provide? How should you use them in your applications? In this talk, you'll learn what security tokens are, how to use them, and how to abuse them. >:) Along the way, you'll learn the differences between the three most popular types of security tokens: JWTs, Macaroons, and PASETO, and when to use (and not use!) them.
  • Bridging the Gap between Physical & Digital Identity Aug 23 2021 1:00 pm UTC 36 mins
    Samy Kamkar, Brooke Lierman, James Segil
    The separation of physical and digital worlds leaves IT systems vulnerable to physical security breaches; today’s world requires a more holistic approach to security. This is true more than ever before, as the surge in remote working in 2020 has teams logging in from home in many locations, while their physical workplaces have less regular attendance that’s now moved to a scheduled rotation for teams to comply with social distancing density requirements. In their global deployment, Intercom uses Okta and Openpath to bridge the gap between physical and digital security, providing a frictionless and secure user experience regardless of where users are. Leveraging the open API architecture Openpath provides, Intercom was able to combine access control with their security suite including Openpath’s native integration with Okta to automatically sync users across the system making it quick and easy to issue or revoke credentials for both an improved security posture and an increased ROI. Giving customers the ability to synchronize users in real-time not only results in fewer vulnerabilities for physical access to locations, but also helps make sure that as new employees onboard in the company, they have quicker and more immediate access to the physical buildings they work in.
  • The Role of Security Executives in Building Customer Trust Aug 20 2021 1:00 pm UTC 45 mins
    Matt Gorham, Sean Joyce, Bob Moore
    While organizations are accelerating their digital transformations at an unprecedented pace, the steep rise in data security breaches and the spread of mis/dis-information are gradually contributing to the erosion of customer trust. Matt Gorham (MD in PwC's Cyber Innovation Institute and Former Assistant Director, FBI's Cyber Division) and Bob Moore (Co-leader for PwC's Cloud Engineering and Security Hub) will join Sean Joyce (Global and US Leader for PwC's Cybersecurity, Privacy, and Forensics), to offer insights into the role that Security Executives play in rebuilding customer trust in this complex Threat environment.
  • The future of IAM in Hybrid IT Aug 18 2021 1:00 pm UTC 46 mins
    Herman Schouten, Joost Koiter & Ivan Gotti
    Organizations are digitizing their products and services now more than ever. And are transforming their IT landscapes into a hybrid one by adding cloud components. Hybrid IT is not going away—if anything it’s expanding and becoming more complex as companies adapt to modern challenges. That’s why securing and expediting IT transformation is very important.

    However, that’s easier said than done. Questions may rise like:

    How to centralize user management and access while modernizing IT?
    How to eliminate IT disruptions?
    How to provide frictionless end user experiences?
    How to secure access for your global workforce
    And which role do Identity & Access Management play in all this?
  • How digital identity supports a secure remote digital workforce Aug 17 2021 1:00 pm UTC 50 mins
    Liesbeth Kempen, Bart Zuidgeest & Ronald van de Pol
    Every organization had to adapt their business in 2020. Those that leaned into the Zero Trust security model and broad cloud adoption were rewarded with a more secure and agile workforce.

    How did these companies quickly adapt to the new normal of working from home quickly and securely?
    How did these companies meet the demands of the modern digital workforce?
    What is their long term strategy for securing their users?
    And what role do technologies like Adaptive MFA, SSO, Provisioning, lifecycle management and workflows in all this?
  • How DataOps & Cloud Data Access are Forcing Data Team to Evolve Aug 16 2021 1:00 pm UTC 38 mins
    Ryan Naughton, Prashanth Ram, Sumit Sarkar
    Nearly all organisations today leverage at least one cloud data platform. The cloud’s flexibility, cost effectiveness, and speed to data insights offers a substantial competitive edge that organizations would be foolish to forgo. But the future of data analytics isn’t just the cloud — it’s many cloud services.

    Immuta’s recent survey of data professionals revealed a trend that may not come as a surprise: Organizations are adopting more than one cloud data platform, and in doing so, aim to operationalize sensitive data for analytics. But if the trend isn’t surprising, its implications — and its timeline — are.

    Sensitive data use, cloud data platform adoption, and regulatory enforcement and evolution are converging faster than analysts predicted, meaning that existing obstacles to managing access to data will grow quickly and exponentially across multiple cloud platforms. Data teams that want to stay competitive must be prepared.

    Join Paige Bartley, Senior Research Analyst at 451 Research, Ryan Naughton, Co-Executive Director at the Center for New Data, and Sumit Sarkar, Senior Director of Product Marketing at Immuta for a session discussing:

    - The key challenges data teams face in managing data access governance in a cloud data ecosystem.
    - Tactics for mitigating risk of unauthorized access and/or use of sensitive data across multiple cloud data platforms.
    - How the Center for New Data securely operationalizes sensitive data for analytics across multiple cloud platforms in order to help stop the spread of COVID-19.
  • The key implementations for customer identity management Recorded: Aug 5 2021 13 mins
    Bryan Glick, Editor-in-Chief at Computer Weekly, and Max Faun, Head of EMEA Consulting at Okta
    Identity and access management (IAM) is becoming an increasingly important part of an effective cybersecurity setup – enabling organizations to provision (or revoke) access to sensitive data, applications or environments.

    In this Computer Weekly video, join 2 distinguished security experts as they discuss:

    The common challenges surrounding IAM implementation
    Key considerations for achieving effective customer IAM
    & more
  • Improving online customer experience with identity management Recorded: Aug 5 2021 13 mins
    Bryan Glick, editor-in-chief at Computer Weekly
    When it comes to identity and access management (IAM), most of the benefits and use cases highlight favorable outcomes from the organization’s perspective – but how will IAM affect the user experience?

    In this video, join Bryan Glick, editor-in-chief at Computer Weekly, as he discusses the role of IAM for users on online interactions. Watch now to get started.
  • Removing the pain caused by directories in B2B & B2C environments Recorded: Aug 5 2021 14 mins
    Bryan Glick, Editor-in-Chief at Computer Weekly, and Max Faun, Head of EMEA Consulting at Okta
    In this video, ComputerWeekly’s Editor-in-Chief, Bryan Glick, sits down with Max Faun, Head of EMEA consulting at Okta to talk about the identity aspect of Identity and Access Management (IAM).

    Tune in as they dive into the challenges that come with managing identities within directories – especially when employees leave a company.
  • The importance of identity in securing your business Recorded: Aug 4 2021 17 mins
    Bryan Glick, editor-in-chief at Computer Weekly,
    Identity management plays a critical role in an organization’s ability to provision access and protect sensitive data – especially when users are remote.

    In this video, join Bryan Glick, editor-in-chief at Computer Weekly, as he discusses:

    The security challenges that organizations are facing – particularly as it relates to the current pandemic
    Adjusting to the ‘new normal’ – working from home, remote communications, etc.
    The importance of identity in securing your business
    & more
  • Why IT directory issues should no longer be viewed as the cost of doing business Recorded: Aug 4 2021 15 mins
    Bryan Glick, Editor-in-Chief at Computer Weekly, and Max Faun, Head of EMEA Consulting at Okta
    In this video, join Bryan Glick, Editor-in-Chief at Computer Weekly, and Max Faun, Head of EMEA Consulting at Okta, as they discuss the growing importance of securing and managing identities for modern organizations, focusing on:

    The role of IT directories
    Directory- & identity-specific security challenges
    Tools & best practices for optimizing your IT directory
    & more

    Watch now to unlock this expert insight.
  • How directories are the Archilles heel of mergers and aquisitions Recorded: Aug 3 2021 20 mins
    Bryan Glick, Editor-in-Chief, ComputerWeekly.com
    If your organization has been through a merger or acquisition, then you already know the challenges that come with bringing together multiple different IT systems.

    This ComputerWeekly.com video with Editor-in-Chief, Bryan Glick, reviews the specific challenges that come with bringing together two organizations’ identity management systems – especially directories.

    Tune in to learn how you can ease the challenges of managing all the information on internal and external identities.
  • Tackling the challenges directories create in a B2B environment Recorded: Aug 3 2021 21 mins
    Max Faun, Head of EMEA consulting at Okta & Bryan Glick, ComputerWeekly’s Editor-in-Chief
    In this video, ComputerWeekly’s Editor-in-Chief, Bryan Glick, sits down with Max Faun, Head of EMEA consulting at Okta to talk about the identity aspect of Identity and Access Management (IAM).

    Tune in as they dive into the challenges that come with managing identities within directories – especially when employees leave a company.
The Identity Standard
The most complete access management platform for your workforce and customers, securing all your critical resources from cloud to ground.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: GDPR + Customer Identity: The Journey to Compliance
  • Live at: May 12 2020 1:45 pm
  • Presented by: Swaroop Sham, Senior Product Marketing Manager, Okta
  • From:
Your email has been sent.
or close