Hi [[ session.user.profile.firstName ]]

The Okta Security Roadmap

Security is crucial for every organization. Security serves as the foundation of trust across the enterprise, customers, and beyond.
Join this session to walk away with a rich toolset of security capability built on the Okta platform. From adopting a modern zero trust architecture to securing end users - see how Okta's security roadmap helps you achieve your security outcomes.

In this session, we plan to cover:
1. Okta's bold roadmap for infrastructure access, including domain-joined user support, policy-based RBAC, and much more.
2. Exciting new product enhancements for risk analysis and ThreatInsight. Understand Okta's approach to leveraging external risk signals into the risk platform. Explore improvements to ThreatInsight algorithms.
3. Finally, we will look at Okta's approach to authenticators, assurance, and more. Learn how authenticators, assurance policies, and smart policy evaluation can ensure the right access. See how Okta is providing increased user and admin visibility.

Join us not just to hear but also see exciting new demos by the product team.
Recorded Jun 9 2021 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Thomas Duesing, Tomer Mayara, Thanh-Ha Nguyen, Grace Wardhana
Presentation preview: The Okta Security Roadmap

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Drive Provisioning from Your HR System to Modernise On/Offboarding Aug 26 2021 1:00 pm UTC 40 mins
    Ryan Bradley, Tarell Evans, Lee Murray
    While many organizations use AD as the authoritative source for provisioning, this model is becoming dated. It often relies on brittle, patchworked, intermediate processes to get data and signals from the real source of truth: HR systems. Why not drive provisioning directly from HR? This has many benefits: increased productivity, strengthened security, and better compliance. Join this session to learn about best practices, typical setups, and recent enhancements in HR-driven IT Provisioning.
  • Building an Auth Experience for Humans Aug 25 2021 1:00 pm UTC 28 mins
    Heather Downing
    In this talk, you will discover how to design secure (and friendly) user experiences when developing your software applications. We will cover best practices in the industry that make an authentication experience easier for users to accept, what things to avoid, and how humans think about security, in general, to make your app a 10 out of 10.
  • How to increase Zero Trust maturity? Aug 24 2021 1:00 pm UTC 55 mins
    Mark van Tiggel, Bart Cools & Joshua Kroez
    The explosion of mobile and cloud technologies has dissolved the traditional perimeter. People – and their identities – are now the single control point across users, devices, and networks. Identity is the foundation of a Zero Trust strategy, ensuring only the right people have access to the right resources.

    Zero Trust has been a hot topic for some time now, and many say it’s even starting to enter buzzword territory. But when putting it into practice:

    Is it actually achievable?
    Are organizations explicitly going down a Zero Trust path?
    What technologies are being implemented during Zero Trust journeys?
    And what steps are they taking to implement a Zero Trust architecture?
  • Securely Accelerate Digital Transformation + CX Through Modern Identity Aug 24 2021 1:00 pm UTC 44 mins
    Benjamin Doyle, Brent Maher, Arun Shrestha, Melek Somai
    Derive key insights from Okta-BeyondID joint customers as they discuss how modern identity helps them adapt to the challenges a digital-first world. This session will focus on how to accelerate business transformation in a way that keeps cybersecurity and excellent digital experiences as top priorities. Learn about each digital transformation journey, as we cover both common and unique challenges, roadmaps, strategy, and successes and lessons learned.

    Sponsored by BeyondID
  • JSON Web Tokens, Macaroons, and PASETOs, Oh my! Aug 23 2021 1:00 pm UTC 30 mins
    Brian Demers
    Security tokens such as JWTs are now commonplace in developer guides and documentation. They are a key part of securing mobile and web applications. Why is this? What benefits do they provide? How should you use them in your applications? In this talk, you'll learn what security tokens are, how to use them, and how to abuse them. >:) Along the way, you'll learn the differences between the three most popular types of security tokens: JWTs, Macaroons, and PASETO, and when to use (and not use!) them.
  • The future of IAM in Hybrid IT Aug 18 2021 1:00 pm UTC 46 mins
    Herman Schouten, Joost Koiter & Ivan Gotti
    Organizations are digitizing their products and services now more than ever. And are transforming their IT landscapes into a hybrid one by adding cloud components. Hybrid IT is not going away—if anything it’s expanding and becoming more complex as companies adapt to modern challenges. That’s why securing and expediting IT transformation is very important.

    However, that’s easier said than done. Questions may rise like:

    How to centralize user management and access while modernizing IT?
    How to eliminate IT disruptions?
    How to provide frictionless end user experiences?
    How to secure access for your global workforce
    And which role do Identity & Access Management play in all this?
  • How digital identity supports a secure remote digital workforce Aug 17 2021 1:00 pm UTC 50 mins
    Liesbeth Kempen, Bart Zuidgeest & Ronald van de Pol
    Every organization had to adapt their business in 2020. Those that leaned into the Zero Trust security model and broad cloud adoption were rewarded with a more secure and agile workforce.

    How did these companies quickly adapt to the new normal of working from home quickly and securely?
    How did these companies meet the demands of the modern digital workforce?
    What is their long term strategy for securing their users?
    And what role do technologies like Adaptive MFA, SSO, Provisioning, lifecycle management and workflows in all this?
  • The key implementations for customer identity management Aug 5 2021 2:00 pm UTC 13 mins
    Bryan Glick, Editor-in-Chief at Computer Weekly, and Max Faun, Head of EMEA Consulting at Okta
    Identity and access management (IAM) is becoming an increasingly important part of an effective cybersecurity setup – enabling organizations to provision (or revoke) access to sensitive data, applications or environments.

    In this Computer Weekly video, join 2 distinguished security experts as they discuss:

    The common challenges surrounding IAM implementation
    Key considerations for achieving effective customer IAM
    & more
  • Improving online customer experience with identity management Aug 5 2021 1:00 pm UTC 13 mins
    Bryan Glick, editor-in-chief at Computer Weekly
    When it comes to identity and access management (IAM), most of the benefits and use cases highlight favorable outcomes from the organization’s perspective – but how will IAM affect the user experience?

    In this video, join Bryan Glick, editor-in-chief at Computer Weekly, as he discusses the role of IAM for users on online interactions. Watch now to get started.
  • Removing the pain caused by directories in B2B & B2C environments Aug 5 2021 9:00 am UTC 14 mins
    Bryan Glick, Editor-in-Chief at Computer Weekly, and Max Faun, Head of EMEA Consulting at Okta
    In this video, ComputerWeekly’s Editor-in-Chief, Bryan Glick, sits down with Max Faun, Head of EMEA consulting at Okta to talk about the identity aspect of Identity and Access Management (IAM).

    Tune in as they dive into the challenges that come with managing identities within directories – especially when employees leave a company.
  • The importance of identity in securing your business Aug 4 2021 1:00 pm UTC 17 mins
    Bryan Glick, editor-in-chief at Computer Weekly,
    Identity management plays a critical role in an organization’s ability to provision access and protect sensitive data – especially when users are remote.

    In this video, join Bryan Glick, editor-in-chief at Computer Weekly, as he discusses:

    The security challenges that organizations are facing – particularly as it relates to the current pandemic
    Adjusting to the ‘new normal’ – working from home, remote communications, etc.
    The importance of identity in securing your business
    & more
  • Why IT directory issues should no longer be viewed as the cost of doing business Aug 4 2021 9:00 am UTC 15 mins
    Bryan Glick, Editor-in-Chief at Computer Weekly, and Max Faun, Head of EMEA Consulting at Okta
    In this video, join Bryan Glick, Editor-in-Chief at Computer Weekly, and Max Faun, Head of EMEA Consulting at Okta, as they discuss the growing importance of securing and managing identities for modern organizations, focusing on:

    The role of IT directories
    Directory- & identity-specific security challenges
    Tools & best practices for optimizing your IT directory
    & more

    Watch now to unlock this expert insight.
  • How directories are the Archilles heel of mergers and aquisitions Recorded: Aug 3 2021 20 mins
    Bryan Glick, Editor-in-Chief, ComputerWeekly.com
    If your organization has been through a merger or acquisition, then you already know the challenges that come with bringing together multiple different IT systems.

    This ComputerWeekly.com video with Editor-in-Chief, Bryan Glick, reviews the specific challenges that come with bringing together two organizations’ identity management systems – especially directories.

    Tune in to learn how you can ease the challenges of managing all the information on internal and external identities.
  • Tackling the challenges directories create in a B2B environment Recorded: Aug 3 2021 21 mins
    Max Faun, Head of EMEA consulting at Okta & Bryan Glick, ComputerWeekly’s Editor-in-Chief
    In this video, ComputerWeekly’s Editor-in-Chief, Bryan Glick, sits down with Max Faun, Head of EMEA consulting at Okta to talk about the identity aspect of Identity and Access Management (IAM).

    Tune in as they dive into the challenges that come with managing identities within directories – especially when employees leave a company.
  • Fast Forwarding Digital Experiences with Identity-centric User Design Recorded: Jul 29 2021 35 mins
    Christie Gifrin, Jason Nadeau
    Over the last several months, organizations across all sectors and regions have increased their investment into digital technologies as part of their response to COVID-19. In a recent McKinsey Global Survey of executives, the crisis has accelerated their digital transformation efforts by 3-4 years, and the share of digital or digitally enabled products in their portfolios has accelerated by an average of 7 years. In this session, Jason Nadeau, Chief Digital Officer of Fidelity National Financial (FNF), will share how FNF reacted to this challenge by rapidly shifting their digital strategy to leverage identity-centric user design. Jason will discuss how FNF approached value creation by working backwards from understanding the end user’s needs and wants, the role identity played in this strategy, and what the future of identity-centric digital experiences looks like for the company.
  • End-to-end encryption and mutual authentication between cloud and edge apps Recorded: Jul 27 2021 40 mins
    Matthew Gregory, Mrinal Wadhwa
    A builders guide to Trust in autonomous connected applications. We'll show how cloud services can establish lightweight secure channels with IoT and edge devices that guarantee end-to-end data integrity, authenticity, and authorization.

    A demo will show how a fleet of machines can be enrolled with cloud services and how applications can exchange attribute based cryptographic credentials to ensure granular, dynamic, policy driven access control.

    Sponsored by Ockam.
  • Creating Custom Integrations on the Okta Platform Recorded: Jul 22 2021 39 mins
    James Flores, Pragya Seth
    Do you need to provision to an app that’s not in Okta’s app catalog or perform an action beyond basic CRUD of identities? If so, this session is for all you advanced IT admins, software vendors, and Okta delivery partners who wish to create custom integrations on the Okta platform. Learn about the options for provisioning to on-premises apps, SCIM-enabled third party or custom apps, and apps that support REST APIs. We'll demo a few too!
  • Security Benefits Integrating Identity with Detection and Response Recorded: Jul 20 2021 28 mins
    Lital Asher - Dotan
    Identity plays a central role in cyber attacks, and it offers a window of opportunity for organizations to detect and respond to security incidents in a timely manner. But finding attacks based on authentication data is hard: it requires knowledge, context, the ability to link authentication data to insight from other security and IT tools, and the ability to sort through mountains of false alerts. Extended Detection and Response - XDR - is an emerging security capability that was developed to connect data from multiple sources and apply out of the box detection and response modules to help security teams effectively identify and stop attacks.
  • Roadmap: A Peek Into the Future of Access Management in Hybrid IT Recorded: Jul 15 2021 34 mins
    Eric Karlinsky, Lance Malacara
    Hybrid IT is not going away—if anything it’s expanding and becoming more complex as companies adapt to modern challenges. This session will cover how Okta helps address Hybrid IT needs by securing on-prem applications, replacing aging legacy tech, and building a bridge between cloud and on-prem. We’ll also provide a preview of how we’ll help our customers solve the challenges of the future.
  • Ask the Experts: Maximising the Value of Okta Recorded: Jul 14 2021 33 mins
    Chael Banks, Dave Fend, Jyotsna Raghunathan, Pragya Seth
    While we see each deployment as unique, we’ve also uncovered common challenges across our vast network of Okta customers. Our proven success methodologies and deep expertise help you mitigate risk and quickly achieve maximum value. Join us for a panel discussion featuring technical experts from our Professional Services team, who have architected and led delivery for numerous complex deployments. This is your opportunity to speak to the experts directly and ask your most challenging questions.
The Identity Standard
The most complete access management platform for your workforce and customers, securing all your critical resources from cloud to ground.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Okta Security Roadmap
  • Live at: Jun 9 2021 1:00 pm
  • Presented by: Thomas Duesing, Tomer Mayara, Thanh-Ha Nguyen, Grace Wardhana
  • From:
Your email has been sent.
or close