Organizations are digitizing their products and services now more than ever. And are transforming their IT landscapes into a hybrid one by adding cloud components. Hybrid IT is not going away—if anything it’s expanding and becoming more complex as companies adapt to modern challenges. That’s why securing and expediting IT transformation is very important.
However, that’s easier said than done. Questions may rise like:
How to centralize user management and access while modernizing IT?
How to eliminate IT disruptions?
How to provide frictionless end user experiences?
How to secure access for your global workforce
And which role do Identity & Access Management play in all this?
RecordedAug 18 202146 mins
Your place is confirmed, we'll send you email reminders
We’ve all watched it happen and now it’s here. Digital has become the primary customer experience. Likewise, most workforces are committed to being permanently distributed.
This means that any business or organization planning for future success must ensure that its digital user experience is a wonderful one: frictionless, engaging and aligned to the brand. And, of course, it must be secure...more secure than ever.
At the heart of this evolution is a modern, intelligent, flexible and scalable identity and access management system (IAM).
Join us in this session to understand the most critical considerations, the business-enabling opportunities and the latest practical insights around implementing future-proof IAM for your customers and workforce.
Keren Elazari, author, celebrated TED speaker and one of the world’s leading cybersecurity thinkers, will preview the evolving landscape of 2021 and beyond
Jiong Liu of Okta reveals why centralizing Identity just might be the most powerful enabler for your business or organization’s future success
Nigel Hedges, Head of Information Security at CPA Australia, will share valuable insights from a recent significant workforce and customer migration project
Ian Lowe, Director of Solutions Marketing, EMEA, Okta
One year on since COVID disrupted our lives, how has it changed the way we work? We look at how trust has evolved between employers and employees, and how with a cloud-based identity management solution, organisations can trust their people to work anywhere.
Zero Trust started a decade ago from the realization that the traditional perimeter-centric security model had failed. But how does identity fit into that? What are the design principles and properties a solution should have? In this talk, we discuss how we got here, and what the maturity model for Identity in Zero Trust looks like.
How is trust transforming business? What does end-to-end trust look like? Discover how creating a new security culture can power the transition to a more fluid working culture – and the key role played by the Digital Trust Officer.
As a critical building block of a true Secure Access Service Edge (SASE) architecture, Zero Trust Data Protection delivers security based on context and continuous risk management, allowing conditional access controls to be defined based on data sensitivity, app risk, user behavior risk, and other factors.
Join Netskope and Anthem to learn why data protection is about context, managing data access based on who the user is and what the user is trying to do. Learn how to apply Zero Trust principles to update ineffective approaches to DLP, protect data in the cloud, and make the right investments to achieve the most effective SASE architecture for networking and security.
The separation of physical and digital worlds leaves IT systems vulnerable to physical security breaches; today’s world requires a more holistic approach to security. This is true more than ever before, as the surge in remote working in 2020 has teams logging in from home in many locations, while their physical workplaces have less regular attendance that’s now moved to a scheduled rotation for teams to comply with social distancing density requirements. In their global deployment, Intercom uses Okta and Openpath to bridge the gap between physical and digital security, providing a frictionless and secure user experience regardless of where users are. Leveraging the open API architecture Openpath provides, Intercom was able to combine access control with their security suite including Openpath’s native integration with Okta to automatically sync users across the system making it quick and easy to issue or revoke credentials for both an improved security posture and an increased ROI. Giving customers the ability to synchronize users in real-time not only results in fewer vulnerabilities for physical access to locations, but also helps make sure that as new employees onboard in the company, they have quicker and more immediate access to the physical buildings they work in.
With increasingly distributed workforces and the rise in identity-based attacks, identity has become the de facto perimeter for organizations today. Identity is the foundation of a zero trust architecture, as you need to ensure the right people have the right level of access, on the right device, to the right resource, in the right context. Learn how a comprehensive, identity-first security strategy can tie the complexities of protecting people and assets together in a seamless experience.
The events of 2020 pushed the notion of trust to the forefront of all our lives. It made customer trust in brands acutely important to the bottom line amidst a severe economic recession. And it has forced many organisations to overcome long-standing objections, to trust their employees to work from home (WFH) and to trust digital channels as the only way to serve their customers.
The key questions which will be addressed in this webcast will be:
What is the quickest route to enhancing productivity, and building loyalty and engagement—not just among employees and partners but definitely also customers?
What can brands, businesses and governments do to build digital trust?
And what role does security tools & policies play in building digital trust?
Zoom and Okta are working together to help meeting participants rapidly authenticate one and other, establish trust, and increase the value of transactions that are increasing in frequency as well as value on Zoom.
A builders guide to Trust in autonomous connected applications. We'll show how cloud services can establish lightweight secure channels with IoT and edge devices that guarantee end-to-end data integrity, authenticity, and authorization.
A demo will show how a fleet of machines can be enrolled with cloud services and how applications can exchange attribute based cryptographic credentials to ensure granular, dynamic, policy driven access control.
As your company grows and evolves, you need an identity solution that can keep up. Pon is a global company with over 80 companies spanning across 130 countries with an aggressive M&A strategy, which means they needed a secure, scalable, flexible, and independent identity solution that could evolve with their dynamic IT landscape. During this session, Pon shares why they chose Okta as their "future-proof" identity solution, some lessons learned during their implementation, current challenges, and what they have planned in the future.
Ankit Garg, Sai Maddali, Teju Shyamsundar, Emanuele Sparvoli
Devices have become a critical part of any modern organization's Identity and Access Management strategy. From managing a BYOD policy to supporting partners and contractors, to adopting MacBooks and new platforms, the growing number of devices has increased the attack surface for IT to manage. At the same time, devices also enable new opportunities to leverage device context for more secure authentication and better user experiences. Come hear our product team discuss deployment tips for exciting new features like Device Visibility, passwordless using Okta FastPass, and integrations with endpoint security vendors. And, learn about the core investments we continue to make in device identity, elevating devices to become a first-class citizen in the Okta Identity Cloud.
Jacqueline Brinkerhoff, Jeff Aboud, Matthew Gardiner & Frederico Hakamine
Working From Home (WFH) is rapidly becoming the new norm, and cyber criminals across the globe are leveraging the panic induced by this pandemic to launch disruptive cyber-attacks. In the new WFH normal, you will have to secure every aspect of the architecture, whether it’s on premise hardware, cloud infrastructure or your employee’s endpoint devices. Any weakness in this entire chain will expose your IT infrastructure to security risks.
This means it is critical that businesses quickly find ways to support their workers to work remotely and to do so in a secure manner. On this CPE accredited panel discussion webinar our experts will examine how to build resilience in a digital enterprise with a focus on agile cloud security in the new WFH environment. Don’t miss this opportunity to question the experts on the dos and don’ts of securing your remote workers, strengthen your security posture in this time of extreme uncertainty, and:
Learn how to educate your home workers on basic security hygiene,
Understand the threat landscape and how cyber-criminals are leveraging fears around COVID-19 to attack your business,
Discover how to use cloud collaboration tools more securely,
Receive best practices you can put into place to eliminate security blind spots.
Jacqueline Brinkerhoff, SailPoint Technologies; Jeff Aboud, Tenable; Matthew Gardiner, Mimecast; and Frederico Hakamine, Okta
Traditional authentication is limiting and cumbersome. Worse still, traditional authentication mechanisms allow attackers to easily bypass controls and gain access to accounts. In this webinar, we will explore modern authentication architectures and the role of risk-based authentication.
Join this session to:
Understand the role and limitations of traditional authentication.
Get a deep dive into security frameworks like CARTA and how newer authentication techniques can secure users.
Understand how risk-based authentication augments your identity security strategy.
Learn how to integrate behavioral signals into your security strategy.
Okta Advanced Server Access helps enable velocity at scale.
In this on-demand webinar, VP of Security Sales Ben Sabrin and Product Marketing Manger Ivan Dwyer discussed how to automate key IAM controls across fleets of dynamic, multi-cloud infrastructure, removing pesky barriers to your DevOps programs.
Topics covered include:
An introduction to the Cloud Operating Model
Deep dive into the Okta Advanced Server Access product
Best practices for injecting IAM into your infrastructure automation
Today’s State & Local Government IT Leaders have challenges around keeping their highly mobile utility, parks, police, paramedics, airports, social workers, and public safety personnel authenticated and connected to their critical applications.
NetMotion's Jay Klauser, VP of Sales Engineering & Alliances and Okta’s Mark Forreider, Sr. Manager, State & Local Government Solutions Engineering discuss the most compelling use cases for NetMotion + Okta integration.
If your organization is currently leveraging Okta or NetMotion or is interested in doing so, watch this webcast to learn more about how you can take advantage of the power of these two solutions.
In this webinar, we’ll cover the latest announcements and advancements from Oktane21, our virtual user conference.
Take a deep dive into our latest products and features and learn how to leverage them to achieve identity-driven security and productivity in your organisation.
What will be covered in this webinar:
Okta’s Zero Trust approach to Privileged Access Management
Okta’s modern approach to Identity Governance for all users
Developer experience enhancements to secure your apps faster
New integrations to automate customer identity workflows and deliver continuous authentication decisions
Alongside the rise in remote work, there’s been a staggering increase in security threats, in particular account takeover (ATO) attacks. Even minor incidents can threaten monetary loss, chargebacks, regulatory fines, and reputation loss. Many organizations see the looming threat that ATO attacks pose to their business, but don’t understand the most important place to start for prevention: identity security.
Watch this 10-minute webinar with IDG and Okta, where you’ll learn:
Why identity-focused security is a critical element in driving digital business
Survey insights on global IT leaders’ identity and access management objectives, practices, and challenges
The perceived threat of account takeover attacks and methods of prevention