Hi [[ session.user.profile.firstName ]]

Authentication Requirements for the Presidential Executive Order

The recent White House Executive Order for multifactor authentication and data encryption is inducing organizations to take essential steps in order to meet fundamental cyber security requirements. Ensuring secure remote trusted access and authentication as part of a broader zero trust environment is crucial for enterprises to thrive as they modernize their IT and security frameworks.

During this webinar we will discuss immediate and practical steps that CISOs and IT professionals can take today to start implementing identity-centric zero trust security. By the end of this webinar you will have a better understanding on how to address the multiple user authentication journeys in your organization and apply the appropriate level of authentication, taking into account:

*Authentication use cases
*User profiles
*Security requirements
*Regulatory constraints
Recorded Jul 8 2021 52 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Asaf Lerner, IAM Market Owner, Thales
Presentation preview: Authentication Requirements for the Presidential Executive Order

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Reeling in the Greatest Security Risk to Your Cloud Infrastructure – Identities Oct 7 2021 4:00 pm UTC 60 mins
    Or Priel, VP Product Management, Ermetic and Travis McPeak, Head of Product Security, Databricks
    The number of human and service identities in an organization’s cloud/multicloud accounts is
    exploding. The permissions enabling those identities to access cloud resources and applications
    pose a huge risk. Excessive entitlements, defined intentionally or unwittingly, can lead to
    accidental or malicious use, network exposure of resources and other ills that plague an
    organization’s cloud security upon a data breach. Detecting, prioritizing and mitigating these risks
    is typically hampered by lack of visibility, lack of manpower, lack of coordination and an inability
    to scale protective measures.

    Cloud identities and their entitlements can’t be ignored. Attend our panel of cloud security
    experts to learn why identities are the new security beast to reel in, why governing access must
    be core to every security program and for fresh views on using automation to remediate risk.
  • Navigating the Modern Identity Landscape: Successful Transformation Strategies Recorded: Sep 16 2021 57 mins
    Ravi Erukulla, Sr. Director of Product Management at Saviynt, Wes Vollmar, Cybersecurity Architect, Marathon Petroleum
    Identity today is not what it was a decade ago. Changes in the technology & regulatory landscape, user behavior, and organizational priorities have transformed it from a compliance-oriented discipline to a business enabler — and often a board-level initiative. It has also become the first step to adopting a modern Zero Trust security model.

    The latest technology has accelerated the need for identity transformation by impacting the way identity is perceived, practiced, and envisioned. These trends include technology convergence, cloud transformation, software simplification, intelligent automation, and business readiness. Identity is further influenced by adjacent security areas, such as SASE, CSPM, and CyberMesh. So how do you navigate this complex landscape and set your organization up for identity security success? Join us for this live webinar to find out.

    In the process, you’ll learn about:

    * The leading factors influencing identity transformation
    * The top trends driving change (and even some predictions too)
    * The benefits of modernizing IAM solutions and practices
    * The biggest lessons learned by organizations on the other side
    * The most common pitfalls and strategies to consider
  • Shifting your IAM Program from Compliance-Driven to Security-Driven Recorded: Aug 19 2021 61 mins
    Zubaid Kazmi, IAM, MorganFranklin; Tom Malta, CEO/Principal at IAM Experts; Perry Menezes, Financial Services, MorganFranklin
    No end in sight…regulatory mandates continue to increase. In response, many organizations create compliance-driven IAM programs with the assumption that security measures are inherently addressed.  While compliance is still a key driver in IAM initiatives, IAM is evolving into a security and risk-based program with capabilities focused on entitlement management and enforcement of logical access controls.

    Building a security and risk driven IAM program allows organizations to adopt broader, enterprise-based solutions that are adaptable to usage trends, such a as cloud, mobile and remote office.  User demand will continue to drive program disciplines to transform from a compliance-based program into a true secure business enabler, helping reduce overall risks created by emerging technologies and threats.
    While compliance and security intersect, they are not considered equal. Join us for a live webinar on the key aspects and benefits of security-driven IAM programs. In this session you'll hear about:

    * Considerations to building a security-driven IAM program
    * Key indicators to determine if your IAM program is compliance-driven or security-driven
    * Benefits of security-driven IAM programs
  • Authentication Requirements for the Presidential Executive Order Recorded: Jul 8 2021 52 mins
    Asaf Lerner, IAM Market Owner, Thales
    The recent White House Executive Order for multifactor authentication and data encryption is inducing organizations to take essential steps in order to meet fundamental cyber security requirements. Ensuring secure remote trusted access and authentication as part of a broader zero trust environment is crucial for enterprises to thrive as they modernize their IT and security frameworks.

    During this webinar we will discuss immediate and practical steps that CISOs and IT professionals can take today to start implementing identity-centric zero trust security. By the end of this webinar you will have a better understanding on how to address the multiple user authentication journeys in your organization and apply the appropriate level of authentication, taking into account:

    *Authentication use cases
    *User profiles
    *Security requirements
    *Regulatory constraints
  • Adopting Zero Trust in a Post-Pandemic World Recorded: May 27 2021 53 mins
    Reza Hussain, Delivery Manager at LikeMinds Consulting
    These days it’s difficult to have a cybersecurity conversation without mentioning Zero Trust. It’s a topic that’s even entered boardrooms as organizations are rapidly rolling out digital transformation, remote work at scale, and cloud migration projects. Zero Trust is seen as the way forward to deliver the right levels of security without sacrificing speed or user experience.

    Join us for a session on Zero Trust from three different points of view - a customer, a vendor, and a consultant. Our panel will discuss their Zero Trust approach to secure large enterprise workforces and some important challenges and lessons learned along the way. Topics will include:

    Strong authentication
    Remote work at scale
    Organizational alignment

    Whether you are new to Zero Trust or a seasoned expert, this panel will provide you with a unique perspective on the topic in a fun and interactive format. Featuring Sriram Santhanam, Director Identity and Access Management at Gap, Aubrey Turner, Executive Advisor at Ping Identity, Thani Anandan, Global Director of IdM and Security at LikeMinds Consulting.
  • Identity Matters – Applying an Identity-Centric Security Strategy in Healthcare Recorded: May 6 2021 54 mins
    Julie Smith, Jeremy Grant, Rebecca Archambault, Heather Mills
    During normal times healthcare is a complex and dynamic industry. The extensive ecosystem of users, devices, and systems is essential to delivering quality patient care, but it also provides ample opportunity for a digital identity to be compromised. In fact, in recent research by the Identity Defined Security Alliance, 78% of the healthcare organizations surveyed reported an identity-related breach in the last 2 years and the industry has suffered an unprecedented number of ransomware attacks in the last year. Through an identity-centric approach to security, Healthcare CISOs have an opportunity to improve security, better serve customers and develop competitive advantages.

    Please join Jeremy Grant, Managing Director of Technology Strategy for Venable, LLP, Rebecca Archambault, Trust Identities Leader at Highmark Western and Northeastern New York and Scott Breece, VP of Security and CISO at Community Health Systems, as we discuss recommendations for the role of identity in healthcare security strategies with members of the H-ISAC Identity Committee. In this webinar you will learn why healthcare CISOs should take a more proactive role in leading identity initiatives, recommendations for identity-centric security strategies as defined in the H-ISAC Framework for Managing and Identity and the Identity Defined Security Framework and how it is being applied across healthcare organizations to reduce risk and provide business value.
  • IAM Stakeholder Perspective on Access Challenges, Business Operations and Risk Recorded: Mar 11 2021 55 mins
    Diane Hagglund, Dimensional Research Founder and Principal; Den Jones, Cisco Sr. Director of Enterprise Security
    Enterprises are facing an explosion in the number of identities being managed (52% say that identities have grown more than five-fold in the past 10 years). They struggle to get their identity and security teams on the same page (only half (53%) report that security has any level of ownership for workforce IAM). And in research conducted in May of 2020, we found out that 94% of organizations have had an identity-related breach), which 99% believe could have been prevented. These insights provide the current state of identity security from the inside – the teams that are immersed in the day to day managing and securing identities, putting in place identity and access management processes and technologies. But what do their stakeholders have to say about the impact of their day to day activities?

    Please join Diane Hagglund, Founder and Principal of Dimensional Research and Den Jones, IDSA Customer Advisory Board Member and Cisco Sr. Director of Enterprise Security, as they discuss the results of our latest research that provides data on the experiences of Identity and Access Management stakeholders, such as Human Resources, Help Desk and Sales Management, and the impact of current practices on security risks and business operations.
  • Why VPN Isn’t Enough: Supporting a Remote Workforce in the Post-COVID Era Recorded: Feb 4 2021 49 mins
    Morey Haber, BeyondTrust Chief Technology Officer, Chief Information Security Officer
    With the rapid development of the Coronavirus (COVID-19) in 2020, many security professionals had to come up with disaster recovery (DR) plans and make quick decisions to allow remote work en masse. The goals: keep the organization productive during this crisis and ensure that any unacceptable security risks are not created in the process. While most DR plans focus on maintaining productivity in the face of a single catastrophic event, Coronavirus represents a long-term threat that might stretch the typical disaster recovery model to its brink of coverage.
    Join Morey Haber, CTO/CISO of BeyondTrust and author of four cybersecurity books, in this webinar for practical guidance on how to quickly implement and scale strong security protocols to enable long-term remote work. He will also cover:

    • Risks and Challenges of VPNs
    • Shadow IT and free, or consumer-grade, tools
    • Bring your own device (BYOD) in the Post-COVID Era
    • Secure remote access & endpoint security – the foundation for effective remote working
  • A decade of identity evolution forced into one chaotic year. What’s next? Recorded: Jan 14 2021 62 mins
    Art Coviello Former CEO of RSA Security, Chris Convey Sharp Healthcare CISO and Evan Fraser ABSA Bank Cybersecurity Architect
    Focal Point and SecZetta Present - Beyond the Pandemic: A decade of identity evolution forced into one chaotic year. What’s next?
    While most of us will look back at 2020 as a year of new and extraordinary challenges, in the world of identity we have much to be thankful for. Join some of the world’s leading identity experts as we explore how resilience in the face of unprecedented adversity was the catalyst for these organizations to innovate their management of third parties through the integration of key technologies that comprise the core components of a zero trust architecture in the cybersecurity industry.

    Join Art Coviello, former CEO of RSA and security thought leader, Chris Convey, CISO at Sharp Healthcare, Evan Fraser, cybersecurity architect at ABSA Bank to learn about the great strides that were made in identity and risk management to support a more dispersed workforce comprised of employees, non-employees and non-humans? How will investments in technology and integrations between those technologies assist you as you move beyond talks of vaccines and into supporting a post pandemic workforce? And where does identity and enterprise risk management go from here?
  • An Identity-Centric Approach to Harden a COVID-19 Critical Business Recorded: Dec 10 2020 40 mins
    George Irungu, Summa Health CISO and Paul Lanzi, Remediant Co-founder and COO
    Stories from the field on rolling out a Privileged Access Management program to a blended remote workforce

    COVID-19 came on pretty suddenly for many of us. The effect it had on the operations and IT infrastructure of health systems ratcheted up rapidly, as they tried to manage (1) an influx of patients, planned and unplanned, (2) new standard operating procedures, (3) migrating and supporting a blended on-premises / remote workforce and (4) a surge in targeted pandemic-related cyberattacks.

    Please join us to hear from George Irungu, an experienced hospital system CISO. George is joined by Paul Lanzi (COO and Co-Founder of Remediant) and will walk through how he used an identity centric approach to adapt and evolve his security program to meet hospital operational needs, manage risk and defend the patient and employee experience.
  • Healthcare Security Fireside Chat: NIST, Identity, and Ransomware Recorded: Nov 19 2020 61 mins
    Scott Breece, Community Health Systems CISO and Gil Kirkpatrick, Semperis Chief Architect
    No one can ignore the sharp uptick of hospitals victimized by ransomware. And in healthcare, the stakes are higher. Just last month, a 78-year-old patient at University Hospital Düsseldorf died after a ransomware attack crippled the hospital's IT systems and forced doctors to attempt to transfer her to another facility. It's clear just how physically dangerous cyberattacks can be, but there are no signs of attackers slowing down. Healthcare organizations, both large and small, are in the crosshairs because human collateral pays. All it takes is a user clicking on the wrong link to kick off a deadly campaign. So, what action can defenders take to avoid becoming a victim of ransomware?

    The Identity Defined Security Alliance (IDSA) provides the framework and practical guidance that helps organizations put identity at the center of their IT security strategy. In this fireside chat, Scott Breece, IDSA Advisory Board Member, and CISO at Community Health Systems, joins Gil Kirkpatrick, Chief Architect at Semperis, for a candid debate about yesteryear's best practices and how to push towards a safer tomorrow. Topics of conversation include the NIST Cybersecurity Framework, managing multiple identity systems in healthcare IT environments, and of course, ransomware.
  • Identity-Centric PAM for Cloud and DevOps Recorded: Oct 29 2020 58 mins
    Chris Owen, Director, Product Management at Centrify
    According to recent research by the Identity-Defined Security Alliance (IDSA), 59% of organizations say that cloud applications are driving a 5X increase in the number of identities over the past 10 years. And, over the past two years, 79% have had an identity-related breach.

    Digital transformation has massively expanded the threatscape, as modern technologies like cloud, DevOps, containers, microservices and more are creating an explosion in the number of machine identities in the IT estate. Now more than ever, it’s vital to take an identity-centric approach to securing privileged access to resources in on-premises, hybrid, and multi-cloud environments.

    In this webinar from Centrify, an IDSA member, we’ll explore:
    1. How organizations have evolved their use of cloud
    2. How Privileged Access Management (PAM) solutions have transformed to support new methodologies and tooling
    3. The differences between a shared account approach and identity-centric approach to PAM
    4. 6 key challenges organizations face for DevSecOps when it comes to cloud, and how to solve them
  • Panel: Future Proofing Identity Security Recorded: Oct 28 2020 52 mins
    Julie Smith, Executive Director of Identity Defined Security Alliance (IDSA)
    Sean Deuby, host of HIP podcast, sits down with industry experts and a special guest, Julie Smith.

    Julie Smith is the Executive Director of the IDSA, responsible for executing the mission on behalf of the membership and the identity and security community. Throughout her career she has held various leadership roles in technology and solutions companies, including product management, product and solutions marketing and business development. Prior to joining the IDSA, Julie spent 12 years in the identity and security industry with leading vendors and solution providers.

    Siddharth Bhai is a Product Management Lead at Google Cloud. His current focus is to provide product leadership for managed security services, which streamline customer deployments and enable enterprises to focus on the best public clouds have to offer. He has been active in the Identity & Access Management space for over a decade and enjoys working with many Fortune 1000 & emerging companies. He has spoken about Identity & Access Management at major industry conferences, including Directory Experts Conference, Microsoft TechEd, and Google Cloud Next.

    Gil Kirkpatrick is the Chief Architect at Semperis. Gil has been building commercial products for enterprise IT for a very long time, focusing primarily on identity management and security-related products. He has been named a Microsoft MVP for Active Directory and Enterprise Mobility for each of the last 15 years, and is the author of Active Directory Programming, as well as the founder of the Directory Experts Conference.

    Host: Sean Deuby, 15-time Microsoft MVP and HIP Podcast Host. Sean brings 30 years’ experience in Enterprise IT and Hybrid Identity to his role as Director of Services at Semperis. An original architect and technical leader of Intel's Active Directory, Texas Instrument’s Windows NT network, and 15-time MVP alumnus, Sean has been involved with Microsoft identity technology since its inception.
  • Automating Attestation: A Critical Step in Security Risk Management Recorded: Oct 9 2020 47 mins
    Andy Smith (Centrify), Allen Moffett (Atos); Eric Uythoven (LexisNexis Risk), James Carder (LogRhythm)
    As the number of identities an organization manages explodes, making sure the right resources (human and non-human) have the right access can be overwhelming. Whether driven by compliance requirements or security risk management, attestation processes can provide periodic visibility into dynamically changing access – who has access, who granted it and who approved it. Automating those processes is a critical step to keeping access rights in line with the principle of least privilege and more importantly, can be automatically triggered as a result of a high-risk event.

    In this panel, part of the Security Outcome Deep Dive Series, identity and security experts will provide real world examples about the role of attestation processes in a security risk management program, the key stakeholders involved and how it can be achieved using technologies that may already be deployed
  • Security Outcome Deep Dive: Governance-Driven Provisioning of Privileged Account Recorded: Oct 1 2020 44 mins
    Christopher Hills, BeyondTrust Deputy Chief Technology Officer and Chris Arnold, Avatier VP of Development
    In this webinar, we'll discuss the details of identity-defined security outcomes, privileged user accounts and entitlements are granted and removed through governance-driven provisioning. These outcomes provide organizations evidence of control over who has access to what resources that are required to meet security controls and compliance requirements, for example PCI, HIPPA, SOX, etc, as well as reduces risk of breach due to too much privileged access.

    Part of our Security Outcome Deep Dive series, where we examine each of the Identity Defined Security Outcomes and Implementation Approaches recently published by the IDSA providing organizations with vendor-neutral guidance on reducing the risk of an identity-related breach.
  • Podcast | Becoming Identity-Aware with Identity Defined Security Alliance Recorded: Sep 24 2020 23 mins
    Julie Smith | Executive Director, Identity Defined Security Alliance (IDSA)
    In a recent report from Identity Defined Security Alliance, 79% of enterprises surveyed suffered an identity breach in the past two years. For episode 11, Executive Director for the IDSA, Julie Smith, joins us with special guest, Gil Kirkpatrick (16-time Microsoft MVP and Chief Architect at Semperis). They discuss zero-trust model initiatives, the NIST Framework, and the call for organizations to have an identity-centric strategy.



    Want to learn more about IDSA?
    Identity Defined Security Alliance provides vendor-neutral, free education, and resources that help organizations reduce the risk of a breach through identity-centric security strategies. To learn more, visit: https://www.idsalliance.org/
  • Security Outcome Deep Dive: Principle of Least Privilege Recorded: Sep 11 2020 40 mins
    Asad Ali, Thales Sr Technologist, Saravanan Thiyagarajan, CyberArk Director Of Technology and Industry Relations
    In this webinar, we'll discuss the details of identity-defined security outcome, user and privileged access rights are granted according to the principle of least privilege and how organizations can reduce the threat landscape by eliminating elevated privileged access beyond roles and responsibilities and detecting and automatically resolving policy-violating account access to maintain continuous compliance.

    Part of our Security Outcome Deep Dive series, where we examine each of the Identity Defined Security Outcomes and Implementation Approaches recently published by the IDSA providing organizations with vendor-neutral guidance on reducing the risk of an identity-related breach.
  • Hacking Identity: The Good, Bad and Ugly of Identity-Centric Security Controls Recorded: Sep 3 2020 64 mins
    Jerod Brennen, SailPoint Identity Strategy and Solutions Advisor
    Identity-related breaches have become ubiquitous. From phishing attempts, to social engineering to compromised privileged credentials, capturing a legitimate set of credentials and even better with privileged access, is every cybercriminals dream. Knowing your opponent and the methods they use to steal identities can be the first step in enhancing an enterprise security strategy with an identity-centric security focus that has resulted in fewer breaches for some companies.

    Join Jerod Brennen, currently a SailPoint Identity Strategy and Solutions Advisor, but formerly a pen tester who worked in SecOps developing a solid grasp of the good, the bad, and the ugly of enterprise identity security. For red teams, this presentation will cover pen testing tips and tricks to circumvent weak or missing identity security controls. For blue teams, we'll also cover the steps you can take to shore up your identity-centric security controls and catch pen testers in the act. Purple teaming, FTW!
  • Security Outcome Deep Dive Series: Access Rights Revoked Based on Risk Recorded: Aug 27 2020 28 mins
    Ben Goodman, ForgeRock Senior Vice President Global Business and Corporate Development
    In this webinar, we'll discuss the details of identity-defined security outcome, Access is revoked upon detection of high-risk event associated with that identity, and how organizational exposure to defined policy breaches can be monitored and reduced.
    Note: If you have viewed other webinars in the series or are already familiar with the IDSA, skip ahead 6 minutes for the Security Outcome discussion.

    Part of our Security Outcome Deep Dive series, where we examine each of the Identity Defined Security Outcomes and Implementation Approaches recently published by the IDSA providing organizations with vendor-neutral guidance on reducing the risk of an identity-related breach.
  • Security Outcome Deep Dive Series: Continuous Access Rights Discovery Recorded: Aug 13 2020 40 mins
    Morey Haber, BeyondTrust CISO and CTO and Chris Gregory, Saviynt VP of Channel Development and Operations
    In this webinar, we'll discuss the details of identity-defined security outcome, all user and privileged access rights are continuously discovered and how organizations can reduce the risk of a breach from over-privileged access and invalid or orphaned accounts.

    Part of our Security Outcome Deep Dive series, where we examine each of the Identity Defined Security Outcomes and Implementation Approaches recently published by the IDSA providing organizations with vendor-neutral guidance on reducing the risk of an identity-related breach.
    Note: If you have viewed other webinars in the series or are already familiar with the IDSA, skip ahead 6 minutes for the Security Outcome discussion.
Advocating the importance of identity-centric security strategies
This channel brings together the leading identity and security vendors and industry experts to regularly educate security leaders on how to reduce risk through identity-centric strategies. For more information check out www.idsalliance.org.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Authentication Requirements for the Presidential Executive Order
  • Live at: Jul 8 2021 4:00 pm
  • Presented by: Asaf Lerner, IAM Market Owner, Thales
  • From:
Your email has been sent.
or close