The importance of identity in securing your business
Identity management plays a critical role in an organization’s ability to provision access and protect sensitive data – especially when users are remote.
In this video, join Bryan Glick, editor-in-chief at Computer Weekly, as he discusses:
The security challenges that organizations are facing – particularly as it relates to the current pandemic
Adjusting to the ‘new normal’ – working from home, remote communications, etc.
The importance of identity in securing your business
RecordedAug 4 202117 mins
Your place is confirmed, we'll send you email reminders
Trust in cloud technologies have never been higher, but the reality for most enterprises is that Hybrid IT is the foreseeable future. Liz Cocker talks to David McClelland about her vision for identity at ITV and the role it plays in a hybrid world.
Angela Salmeron, Associate Research Director, European Future of Work, IDC
What is the future of the modern workforce in Europe? Where are C-level directors focusing their attention? We look at the impact of legislation on the workforce, alongside the long-term and societal implications of the shift to remote working.
The current threat landscape is breaking all records, with the rise of remote working creating new security risks. Find out how this has prompted a shift in mindset and behaviour among people working from home – and how businesses are responding.
Many organisations have a mix of on-prem and cloud-based apps, whether due to regulation or as because of an ongoing modernisation strategy. So how can identity best be managed in a hybrid environment? We look at some of the solutions.
We’ve all watched it happen and now it’s here. Digital has become the primary customer experience. Likewise, most workforces are committed to being permanently distributed.
This means that any business or organization planning for future success must ensure that its digital user experience is a wonderful one: frictionless, engaging and aligned to the brand. And, of course, it must be secure...more secure than ever.
At the heart of this evolution is a modern, intelligent, flexible and scalable identity and access management system (IAM).
Join us in this session to understand the most critical considerations, the business-enabling opportunities and the latest practical insights around implementing future-proof IAM for your customers and workforce.
Keren Elazari, author, celebrated TED speaker and one of the world’s leading cybersecurity thinkers, will preview the evolving landscape of 2021 and beyond
Jiong Liu of Okta reveals why centralizing Identity just might be the most powerful enabler for your business or organization’s future success
Nigel Hedges, Head of Information Security at CPA Australia, will share valuable insights from a recent significant workforce and customer migration project
Ian Lowe, Director of Solutions Marketing, EMEA, Okta
One year on since COVID disrupted our lives, how has it changed the way we work? We look at how trust has evolved between employers and employees, and how with a cloud-based identity management solution, organisations can trust their people to work anywhere.
Zero Trust started a decade ago from the realization that the traditional perimeter-centric security model had failed. But how does identity fit into that? What are the design principles and properties a solution should have? In this talk, we discuss how we got here, and what the maturity model for Identity in Zero Trust looks like.
How is trust transforming business? What does end-to-end trust look like? Discover how creating a new security culture can power the transition to a more fluid working culture – and the key role played by the Digital Trust Officer.
As a critical building block of a true Secure Access Service Edge (SASE) architecture, Zero Trust Data Protection delivers security based on context and continuous risk management, allowing conditional access controls to be defined based on data sensitivity, app risk, user behavior risk, and other factors.
Join Netskope and Anthem to learn why data protection is about context, managing data access based on who the user is and what the user is trying to do. Learn how to apply Zero Trust principles to update ineffective approaches to DLP, protect data in the cloud, and make the right investments to achieve the most effective SASE architecture for networking and security.
The separation of physical and digital worlds leaves IT systems vulnerable to physical security breaches; today’s world requires a more holistic approach to security. This is true more than ever before, as the surge in remote working in 2020 has teams logging in from home in many locations, while their physical workplaces have less regular attendance that’s now moved to a scheduled rotation for teams to comply with social distancing density requirements. In their global deployment, Intercom uses Okta and Openpath to bridge the gap between physical and digital security, providing a frictionless and secure user experience regardless of where users are. Leveraging the open API architecture Openpath provides, Intercom was able to combine access control with their security suite including Openpath’s native integration with Okta to automatically sync users across the system making it quick and easy to issue or revoke credentials for both an improved security posture and an increased ROI. Giving customers the ability to synchronize users in real-time not only results in fewer vulnerabilities for physical access to locations, but also helps make sure that as new employees onboard in the company, they have quicker and more immediate access to the physical buildings they work in.
With increasingly distributed workforces and the rise in identity-based attacks, identity has become the de facto perimeter for organizations today. Identity is the foundation of a zero trust architecture, as you need to ensure the right people have the right level of access, on the right device, to the right resource, in the right context. Learn how a comprehensive, identity-first security strategy can tie the complexities of protecting people and assets together in a seamless experience.
The events of 2020 pushed the notion of trust to the forefront of all our lives. It made customer trust in brands acutely important to the bottom line amidst a severe economic recession. And it has forced many organisations to overcome long-standing objections, to trust their employees to work from home (WFH) and to trust digital channels as the only way to serve their customers.
The key questions which will be addressed in this webcast will be:
What is the quickest route to enhancing productivity, and building loyalty and engagement—not just among employees and partners but definitely also customers?
What can brands, businesses and governments do to build digital trust?
And what role does security tools & policies play in building digital trust?
Zoom and Okta are working together to help meeting participants rapidly authenticate one and other, establish trust, and increase the value of transactions that are increasing in frequency as well as value on Zoom.
A builders guide to Trust in autonomous connected applications. We'll show how cloud services can establish lightweight secure channels with IoT and edge devices that guarantee end-to-end data integrity, authenticity, and authorization.
A demo will show how a fleet of machines can be enrolled with cloud services and how applications can exchange attribute based cryptographic credentials to ensure granular, dynamic, policy driven access control.
As your company grows and evolves, you need an identity solution that can keep up. Pon is a global company with over 80 companies spanning across 130 countries with an aggressive M&A strategy, which means they needed a secure, scalable, flexible, and independent identity solution that could evolve with their dynamic IT landscape. During this session, Pon shares why they chose Okta as their "future-proof" identity solution, some lessons learned during their implementation, current challenges, and what they have planned in the future.
Ankit Garg, Sai Maddali, Teju Shyamsundar, Emanuele Sparvoli
Devices have become a critical part of any modern organization's Identity and Access Management strategy. From managing a BYOD policy to supporting partners and contractors, to adopting MacBooks and new platforms, the growing number of devices has increased the attack surface for IT to manage. At the same time, devices also enable new opportunities to leverage device context for more secure authentication and better user experiences. Come hear our product team discuss deployment tips for exciting new features like Device Visibility, passwordless using Okta FastPass, and integrations with endpoint security vendors. And, learn about the core investments we continue to make in device identity, elevating devices to become a first-class citizen in the Okta Identity Cloud.
Jacqueline Brinkerhoff, Jeff Aboud, Matthew Gardiner & Frederico Hakamine
Working From Home (WFH) is rapidly becoming the new norm, and cyber criminals across the globe are leveraging the panic induced by this pandemic to launch disruptive cyber-attacks. In the new WFH normal, you will have to secure every aspect of the architecture, whether it’s on premise hardware, cloud infrastructure or your employee’s endpoint devices. Any weakness in this entire chain will expose your IT infrastructure to security risks.
This means it is critical that businesses quickly find ways to support their workers to work remotely and to do so in a secure manner. On this CPE accredited panel discussion webinar our experts will examine how to build resilience in a digital enterprise with a focus on agile cloud security in the new WFH environment. Don’t miss this opportunity to question the experts on the dos and don’ts of securing your remote workers, strengthen your security posture in this time of extreme uncertainty, and:
Learn how to educate your home workers on basic security hygiene,
Understand the threat landscape and how cyber-criminals are leveraging fears around COVID-19 to attack your business,
Discover how to use cloud collaboration tools more securely,
Receive best practices you can put into place to eliminate security blind spots.
Jacqueline Brinkerhoff, SailPoint Technologies; Jeff Aboud, Tenable; Matthew Gardiner, Mimecast; and Frederico Hakamine, Okta