Security is crucial for every organization. Security serves as the foundation of trust across the enterprise, customers, and beyond.
Join this session to walk away with a rich toolset of security capability built on the Okta platform. From adopting a modern zero trust architecture to securing end users - see how Okta's security roadmap helps you achieve your security outcomes.
In this session, we plan to cover:
1. Okta's bold roadmap for infrastructure access, including domain-joined user support, policy-based RBAC, and much more.
2. Exciting new product enhancements for risk analysis and ThreatInsight. Understand Okta's approach to leveraging external risk signals into the risk platform. Explore improvements to ThreatInsight algorithms.
3. Finally, we will look at Okta's approach to authenticators, assurance, and more. Learn how authenticators, assurance policies, and smart policy evaluation can ensure the right access. See how Okta is providing increased user and admin visibility.
Join us not just to hear but also see exciting new demos by the product team.
RecordedJun 9 202145 mins
Your place is confirmed, we'll send you email reminders
While many organizations use AD as the authoritative source for provisioning, this model is becoming dated. It often relies on brittle, patchworked, intermediate processes to get data and signals from the real source of truth: HR systems. Why not drive provisioning directly from HR? This has many benefits: increased productivity, strengthened security, and better compliance. Join this session to learn about best practices, typical setups, and recent enhancements in HR-driven IT Provisioning.
In this talk, you will discover how to design secure (and friendly) user experiences when developing your software applications. We will cover best practices in the industry that make an authentication experience easier for users to accept, what things to avoid, and how humans think about security, in general, to make your app a 10 out of 10.
The explosion of mobile and cloud technologies has dissolved the traditional perimeter. People – and their identities – are now the single control point across users, devices, and networks. Identity is the foundation of a Zero Trust strategy, ensuring only the right people have access to the right resources.
Zero Trust has been a hot topic for some time now, and many say it’s even starting to enter buzzword territory. But when putting it into practice:
Is it actually achievable?
Are organizations explicitly going down a Zero Trust path?
What technologies are being implemented during Zero Trust journeys?
And what steps are they taking to implement a Zero Trust architecture?
Benjamin Doyle, Brent Maher, Arun Shrestha, Melek Somai
Derive key insights from Okta-BeyondID joint customers as they discuss how modern identity helps them adapt to the challenges a digital-first world. This session will focus on how to accelerate business transformation in a way that keeps cybersecurity and excellent digital experiences as top priorities. Learn about each digital transformation journey, as we cover both common and unique challenges, roadmaps, strategy, and successes and lessons learned.
Security tokens such as JWTs are now commonplace in developer guides and documentation. They are a key part of securing mobile and web applications. Why is this? What benefits do they provide? How should you use them in your applications? In this talk, you'll learn what security tokens are, how to use them, and how to abuse them. >:) Along the way, you'll learn the differences between the three most popular types of security tokens: JWTs, Macaroons, and PASETO, and when to use (and not use!) them.
Organizations are digitizing their products and services now more than ever. And are transforming their IT landscapes into a hybrid one by adding cloud components. Hybrid IT is not going away—if anything it’s expanding and becoming more complex as companies adapt to modern challenges. That’s why securing and expediting IT transformation is very important.
However, that’s easier said than done. Questions may rise like:
How to centralize user management and access while modernizing IT?
How to eliminate IT disruptions?
How to provide frictionless end user experiences?
How to secure access for your global workforce
And which role do Identity & Access Management play in all this?
Liesbeth Kempen, Bart Zuidgeest & Ronald van de Pol
Every organization had to adapt their business in 2020. Those that leaned into the Zero Trust security model and broad cloud adoption were rewarded with a more secure and agile workforce.
How did these companies quickly adapt to the new normal of working from home quickly and securely?
How did these companies meet the demands of the modern digital workforce?
What is their long term strategy for securing their users?
And what role do technologies like Adaptive MFA, SSO, Provisioning, lifecycle management and workflows in all this?
Bryan Glick, Editor-in-Chief at Computer Weekly, and Max Faun, Head of EMEA Consulting at Okta
Identity and access management (IAM) is becoming an increasingly important part of an effective cybersecurity setup – enabling organizations to provision (or revoke) access to sensitive data, applications or environments.
In this Computer Weekly video, join 2 distinguished security experts as they discuss:
The common challenges surrounding IAM implementation
Key considerations for achieving effective customer IAM
When it comes to identity and access management (IAM), most of the benefits and use cases highlight favorable outcomes from the organization’s perspective – but how will IAM affect the user experience?
In this video, join Bryan Glick, editor-in-chief at Computer Weekly, as he discusses the role of IAM for users on online interactions. Watch now to get started.
Identity management plays a critical role in an organization’s ability to provision access and protect sensitive data – especially when users are remote.
In this video, join Bryan Glick, editor-in-chief at Computer Weekly, as he discusses:
The security challenges that organizations are facing – particularly as it relates to the current pandemic
Adjusting to the ‘new normal’ – working from home, remote communications, etc.
The importance of identity in securing your business
Bryan Glick, Editor-in-Chief at Computer Weekly, and Max Faun, Head of EMEA Consulting at Okta
In this video, join Bryan Glick, Editor-in-Chief at Computer Weekly, and Max Faun, Head of EMEA Consulting at Okta, as they discuss the growing importance of securing and managing identities for modern organizations, focusing on:
The role of IT directories
Directory- & identity-specific security challenges
Tools & best practices for optimizing your IT directory
If your organization has been through a merger or acquisition, then you already know the challenges that come with bringing together multiple different IT systems.
This ComputerWeekly.com video with Editor-in-Chief, Bryan Glick, reviews the specific challenges that come with bringing together two organizations’ identity management systems – especially directories.
Tune in to learn how you can ease the challenges of managing all the information on internal and external identities.
Over the last several months, organizations across all sectors and regions have increased their investment into digital technologies as part of their response to COVID-19. In a recent McKinsey Global Survey of executives, the crisis has accelerated their digital transformation efforts by 3-4 years, and the share of digital or digitally enabled products in their portfolios has accelerated by an average of 7 years. In this session, Jason Nadeau, Chief Digital Officer of Fidelity National Financial (FNF), will share how FNF reacted to this challenge by rapidly shifting their digital strategy to leverage identity-centric user design. Jason will discuss how FNF approached value creation by working backwards from understanding the end user’s needs and wants, the role identity played in this strategy, and what the future of identity-centric digital experiences looks like for the company.
A builders guide to Trust in autonomous connected applications. We'll show how cloud services can establish lightweight secure channels with IoT and edge devices that guarantee end-to-end data integrity, authenticity, and authorization.
A demo will show how a fleet of machines can be enrolled with cloud services and how applications can exchange attribute based cryptographic credentials to ensure granular, dynamic, policy driven access control.
Do you need to provision to an app that’s not in Okta’s app catalog or perform an action beyond basic CRUD of identities? If so, this session is for all you advanced IT admins, software vendors, and Okta delivery partners who wish to create custom integrations on the Okta platform. Learn about the options for provisioning to on-premises apps, SCIM-enabled third party or custom apps, and apps that support REST APIs. We'll demo a few too!
Identity plays a central role in cyber attacks, and it offers a window of opportunity for organizations to detect and respond to security incidents in a timely manner. But finding attacks based on authentication data is hard: it requires knowledge, context, the ability to link authentication data to insight from other security and IT tools, and the ability to sort through mountains of false alerts. Extended Detection and Response - XDR - is an emerging security capability that was developed to connect data from multiple sources and apply out of the box detection and response modules to help security teams effectively identify and stop attacks.
Hybrid IT is not going away—if anything it’s expanding and becoming more complex as companies adapt to modern challenges. This session will cover how Okta helps address Hybrid IT needs by securing on-prem applications, replacing aging legacy tech, and building a bridge between cloud and on-prem. We’ll also provide a preview of how we’ll help our customers solve the challenges of the future.
Chael Banks, Dave Fend, Jyotsna Raghunathan, Pragya Seth
While we see each deployment as unique, we’ve also uncovered common challenges across our vast network of Okta customers. Our proven success methodologies and deep expertise help you mitigate risk and quickly achieve maximum value. Join us for a panel discussion featuring technical experts from our Professional Services team, who have architected and led delivery for numerous complex deployments. This is your opportunity to speak to the experts directly and ask your most challenging questions.