Hi [[ session.user.profile.firstName ]]

Lifecycle Management 101

Is managing your users' lifecycles challenging? Do you rely on scripts, manual processes, and tickets? In this session, we cover the basics of lifecycle management and discuss useful features in the Okta Lifecycle Management product. Specifically, we address how to integrate authoritative sources and automate onboarding/offboarding. We'll show a demo of Lifecycle Management and hear from John Yape of Tegna, an Okta customer, about how they use the technology.
Recorded May 18 2021 38 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Alyssa Huitema, Chris Warnick, John Yape
Presentation preview: Lifecycle Management 101

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Anchoring Digital Trust with Real Identity Recorded: Jun 24 2021 28 mins
    Robert Humphrey, Dhruvin Shah
    Now more than ever, digital trust is what makes the world go round.. Why? Because the pandemic has created a dramatic shift to online everything. Digital programs have accelerated - what started as strategic plans have become mandates overnight. And on top of this, fraudsters have become increasingly active and innovative. In this session, Onfido and Northern Trust will share their story of how they rebuilt trust online, by anchoring a user’s real identity to their digital presence.

    Sponsored by Onfido
  • Mobile Worker Security or User Experience - How About Both? Recorded: Jun 22 2021 30 mins
    Jason Georgi
    Remote working is here to stay, even if how it looks will change over time. It's time to get serious about treating remote access as a primary means of accessing company resources, making security and end user experience compromises unrealistic. Future-proofing your mobile worker strategy is critical - with true Zero Trust Network Access (ZTNA) and digital experience management (DEM), Palo Alto Networks is redefining cloud-delivered security for the next generation of mobile work.

    Sponsored by Palo Alto Networks
  • The Anywhere Employee Workspace Recorded: Jun 17 2021 42 mins
    Greg Armanini, Rusty Burchfield, Steven D'Sa
    VMware Workspace ONE®, in partnership with Okta, delivers the best-in-class capabilities required for today’s anywhere workforce. In this session, you will learn how to deliver an experience hub with simplified remote employee onboarding, self-service and employee workflows. Using Factor-Based Device Trust you can secure it on any device OS and enrollment type for a zero-trust world. In addition to hearing about how other organizations take advantage of workspaces, you will get deployment tips from VMware experts. Sponsored by VMware
  • The Role of Security Executives in Building Customer Trust Recorded: Jun 16 2021 45 mins
    Matt Gorham, Sean Joyce, Bob Moore
    While organizations are accelerating their digital transformations at an unprecedented pace, the steep rise in data security breaches and the spread of mis/dis-information are gradually contributing to the erosion of customer trust. Matt Gorham (MD in PwC's Cyber Innovation Institute and Former Assistant Director, FBI's Cyber Division) and Bob Moore (Co-leader for PwC's Cloud Engineering and Security Hub) will join Sean Joyce (Global and US Leader for PwC's Cybersecurity, Privacy, and Forensics), to offer insights into the role that Security Executives play in rebuilding customer trust in this complex Threat environment.
  • How to Achieve Zero Trust Data Protection in the Cloud Recorded: Jun 16 2021 40 mins
    Jason Clark, Dustin Wilcox
    As a critical building block of a true Secure Access Service Edge (SASE) architecture, Zero Trust Data Protection delivers security based on context and continuous risk management, allowing conditional access controls to be defined based on data sensitivity, app risk, user behavior risk, and other factors.

    Join Netskope and Anthem to learn why data protection is about context, managing data access based on who the user is and what the user is trying to do. Learn how to apply Zero Trust principles to update ineffective approaches to DLP, protect data in the cloud, and make the right investments to achieve the most effective SASE architecture for networking and security.
  • Captivate Your Target Audience with an All-Around Customer Identity Experience Recorded: Jun 15 2021 44 mins
    Christine Garvey, Sandeep Kumbhat, Andy March, Payal Pan
    Great customer experiences are no longer just nice to have, they’re a key differentiator between you and your competitors. Consumers seek brands that share characteristic attributes or values that they identify with, and they value connections with brands that give them opportunities for self growth. To build that connection with your consumers, achieving a true 360-degree view of your users requires a digital identity platform that tracks all of their interactions online and offline. And your customers also care about security, and your business’s reputation relies on keeping your customers’ personal data secure. Okta’s CIAM solutions allow you to know who your customers are, and enable you to create engaging experiences, while ensuring a secure, seamless and straightforward customer experience for them, at all touch points along the customer journey.
  • Investing in Identity: Themes and Trends for the Year Ahead Recorded: Jun 15 2021 42 mins
    Monty Gray, Yodfat Harel Buchris, Xuezhao Lan, Miki Reynolds
    Join leaders in venture capital as they discuss new trends in identity, privacy, and security investing.
  • AD, Post Mortem: Rubrik’s Transition to 100% Cloud Recorded: Jun 10 2021 31 mins
    Joseph Doyle, Lindsey John
    Forward-thinking IT departments are aggressively adopting the cloud to increase IT agility, decrease costs, and bolster their security posture. Though moving 100% to the cloud may be impossible for some, it is still a goal that many are exploring. Rubrik is an excellent example of such a company who is quickly adopting this cloud-only architecture. Founded in 2014 and recognized as #9 on the Forbes Top 100 Cloud Companies last year, Rubrik has grown exponentially and needed to develop a cohesive identity strategy to manage their growth. Come hear Joseph Doyle, Director of Enterprise Security, talk through his ongoing journey of cloud migration, including removing their multiple AD instances, setting up robust access strategy, deploying a device management plan.
  • The Okta Security Roadmap Recorded: Jun 9 2021 45 mins
    Thomas Duesing, Tomer Mayara, Thanh-Ha Nguyen, Grace Wardhana
    Security is crucial for every organization. Security serves as the foundation of trust across the enterprise, customers, and beyond.
    Join this session to walk away with a rich toolset of security capability built on the Okta platform. From adopting a modern zero trust architecture to securing end users - see how Okta's security roadmap helps you achieve your security outcomes.

    In this session, we plan to cover:
    1. Okta's bold roadmap for infrastructure access, including domain-joined user support, policy-based RBAC, and much more.
    2. Exciting new product enhancements for risk analysis and ThreatInsight. Understand Okta's approach to leveraging external risk signals into the risk platform. Explore improvements to ThreatInsight algorithms.
    3. Finally, we will look at Okta's approach to authenticators, assurance, and more. Learn how authenticators, assurance policies, and smart policy evaluation can ensure the right access. See how Okta is providing increased user and admin visibility.

    Join us not just to hear but also see exciting new demos by the product team.
  • Your Connection Is Not Secure: Restoring Trust to a Work Anywhere World Recorded: Jun 8 2021 36 mins
    Ryan Kalember
    While the steady drumbeat of bad news made cybersecurity often feel hopeless this past year, the outlines of a better future clearly emerged. The threat landscape still targets people and their digital identities, relies heavily on social engineering, and preys on the connections we make in the cloud. The path forward flows through the same channels: putting people and digital identity at the center of our security strategies. Join Ryan Kalember, Proofpoint’s EVP of cybersecurity strategy, as he delves into: How attacks on people have evolved, and where they’re likely to go next How organizations are winning the battle against cybercrime with people-centric controls What a more secure future looks like Sponsored by Proofpoint
  • Zero Trust Delivered by the Cloud with CrowdStrike Recorded: Jun 3 2021 31 mins
    Jeannie Warner
    Zero Trust is a security framework requiring all users, whether in or outside the organization’s network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data.

    The basic principles of Zero Trust per NIST 800-207:
    1. Continuous verification of all entities trying to access a resource via dynamic policy
    2. Use of behavioral analysis, static hygiene information, and attack patterns combined with policies
    3. Analysis of information from the IT “stack” including user, workload, endpoint to create risk scores and threat graph
    4. Enforce segmentation and least privilege principles

    Most organizations who have not started on Zero Trust blame the complexity, as they’re often managing over 130+ security tools. Adding more just makes the employees miserable.

    But is there a simpler way?

    Jeannie Warner, CISSP will share how CrowdStrike’s Zero Trust approach for endpoint, workload, and identity, along with the technical partnership with Okta, make Zero Trust simpler and more cost efficient to manage - fast.

    Sponsored by Crowdstrike
  • The Role of Security Executives in Building Customer Trust Recorded: May 12 2021 44 mins
    Matt Gorham, Sean Joyce, Bob Moore
    While organizations are accelerating their digital transformations at an unprecedented pace, the steep rise in data security breaches and the spread of mis/dis-information are gradually contributing to the erosion of customer trust. Matt Gorham (MD in PwC's Cyber Innovation Institute and Former Assistant Director, FBI's Cyber Division) and Bob Moore (Co-leader for PwC's Cloud Engineering and Security Hub) will join Sean Joyce (Global and US Leader for PwC's Cybersecurity, Privacy, and Forensics), to offer insights into the role that Security Executives play in rebuilding customer trust in this complex Threat environment.
  • Bridging the Gap between Physical & Digital Identity Recorded: May 11 2021 35 mins
    Samy Kamkar, Brooke Lierman, James Segil
    The separation of physical and digital worlds leaves IT systems vulnerable to physical security breaches; today’s world requires a more holistic approach to security. This is true more than ever before, as the surge in remote working in 2020 has teams logging in from home in many locations, while their physical workplaces have less regular attendance that’s now moved to a scheduled rotation for teams to comply with social distancing density requirements. In their global deployment, Intercom uses Okta and Openpath to bridge the gap between physical and digital security, providing a frictionless and secure user experience regardless of where users are. Leveraging the open API architecture Openpath provides, Intercom was able to combine access control with their security suite including Openpath’s native integration with Okta to automatically sync users across the system making it quick and easy to issue or revoke credentials for both an improved security posture and an increased ROI. Giving customers the ability to synchronize users in real-time not only results in fewer vulnerabilities for physical access to locations, but also helps make sure that as new employees onboard in the company, they have quicker and more immediate access to the physical buildings they work in.
  • Okta Insights: The Future of Identity Recorded: Apr 16 2021 51 mins
    Danielle De Laine, Okta | David Bradbury, Okta | Robert Marino, Sensis | Philipp Kristian, Trust Futurist
    Join Okta for a jam-packed session with David Bradbury CSO of Okta, an Okta customer and Philipp Kristian Trust Futurist, as we journey through the now, the new, and the future in the world of Identity, Freedom, Cybersecurity and the dichotomy of Zero Trust.

    Key highlights:
    Hear David Bradbury CSO Okta, talk about the role of Identity in securing our new world
    A fireside chat with Okta customer Robert Marino, Head of Enterprise Platforms Sensis, about their latest initiatives on all matters Identity and Security
    Philipp Kristian Trust Futurist, on Trusting Right - From Zero to Hero of Digital Trust Transformation
  • CISO Strategy in Focus: Critical Steps for Re-Thinking Security Design Recorded: Apr 13 2021 64 mins
    Jinan Budge, Forrester Principal Analyst David Bradbury, Chief Security Officer, Okta
    How will the future workplace look, and what are the best-practice models for securing it? Why is continuing to rely on traditional approaches courting disaster? What are the steps you must take to implementing Zero Trust across your ecosystem? What are the top trends in Identity Management and how can your organisation leverage these for customer success?

    Join featured guest and Forrester Principal Analyst, Jinan Budge, and CSO of Okta, David Bradbury for a timely discussion about:
    Rethinking cybersecurity in a post-COVID reality
    The future of identity and the extended Zero Trust ecosystem
    The rapidly evolving role of CISO and how best to position yourself for success
  • Reclaiming our Space: Contributions of People of Color in Technology Recorded: Apr 13 2021 32 mins
    Kimberly Bryant, Founder + CEO, Black Girls CODE
    Have you ever heard of James West? How about Mark Dean? Probably not. Without James your phone wouldn’t have it’s microphone. Mark helped to develop the IBM PC, and holds one third of IBM’s original patents. When we talk about the development of technology, it’s rare that we discuss the past contributions from minorities or explore what it means for organizations such as Black Girls Code and other advocates who seek to create a more inclusive innovation space. In this brand new talk, Kimberly Bryant traces the history of how minorities have shaped our technological culture and the importance of amplifying their innovations of the future.
  • Eliminate Usability and Security Tradeoffs: The Future of Identity Platforms Recorded: Apr 13 2021 38 mins
    Arnab Bose, VP of Product Management, Okta Janani Nagarajan, Director of Product Marketing, CrowdStrike
    In this session, we’ll dive into the leading challenges organizations are faced with in enabling seamless, secure access for customer, partner and employee scenarios, as well as the role identity can play in delivering the flexibility and customizability needed to implement a wide range of identity-based solutions. We'll also take a deep dive into the Okta Identity Engine, to show how companies can integrate Okta with CrowdStrike for an example use case, implementing a Zero Trust strategy.
  • Devices in the enterprise: Managing security vs usability with Okta Recorded: Apr 13 2021 30 mins
    Trey Ray, Manager Cybersecurity, FedEx Teju Shyamsundar, Senior Product Marketing Manager, Okta
    peakers:

    Trey Ray, Manager Cybersecurity, FedEx

    Teju Shyamsundar, Senior Product Marketing Manager, Okta
  • A New Approach to Automation and Identity Management Recorded: Apr 13 2021 36 mins
    George Kwon, Senior Director of Product Management, Okta & Mohan Ramaswamy, Senior Manager, Digital Services Group, T-Mobile
    Automation has always been a core part of a mature IAM program. It is an incredibly powerful tool that can deliver great end user experiences, secure access and even manage compliance risk. However, over the years, hand crafted and brittle integrations and failed deployments have given automation a bad rap and analysts have even steered customers away from prioritising automation. The Okta Workflows platform changes the game by delivering low code automation to the Identity industry. For the first time, Identity teams can get all the benefits of automation, without all the downsides. In this session, we’ll walk through the role of automation in Identity Management past and present, and how Okta Workflows can transform your teams in some unexpected ways.
  • Everything You Need to Know about Modern, Distributed Security Best Practices Recorded: Apr 12 2021 47 mins
    Sandeep Kumbhat, Master Principal Solutions Architect, Okta
    In this webinar, Okta security veteran Sandeep Kumbhat will walk through best practices and tips for long-term security in today's remote work environment, including:

    How to leverage automation to improve security and deliver faster service support
    Ways to use identity-driven security to mitigate both immediate and long-term risk of common cyberattacks, such as phishing
    What key integrations you should consider across the Zero Trust security stack to enable remote work
    Long-term implications for industries including financial services, healthcare, manufacturing, retail and more
The Identity Standard
The most complete access management platform for your workforce and customers, securing all your critical resources from cloud to ground.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Lifecycle Management 101
  • Live at: May 18 2021 12:00 pm
  • Presented by: Alyssa Huitema, Chris Warnick, John Yape
  • From:
Your email has been sent.
or close