InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

A Guide to Securing Cloud Access with CAEP

Presented by

Asad Ali, Thales; Mike Kiser, SailPoint; Atul Tulshibagwale, SGNL

About this talk

The lack of interoperability in zero-trust products is hurting adoption and is a big factor in organizations not being able to achieve their security goals through existing products. Those who claim success have cobbled together solutions using proprietary protocols and niche implementations that only address a small spectrum of the problem space. Open standards that enable continuously monitored context based access to online resources can help existing products interoperate. In this joint webinar hosted by the IDSA and OpenID Foundation, we'll discuss a new standard that is being developed in the OpenID Foundation SSE (Shared Signals and Events) working group. CAEP (Continuous Access and Evaluation Profile) is a drastically new approach to cybersecurity that utilizes a user’s complete online footprint collected through a collaborative exchange of events and signals between multiple participating parties. Recognized by Gartner as an "innovation trigger" technology in their 2022 Digital Identity Hype Cycle, CAEP has been adopted by companies like Microsoft, exchanging millions of SSE events every day. What You Will Learn: How CAEP can increase the level of online security for users, identity providers, and service providers alike. How CAEP can help achieve identity security best practices and outcomes. What you can do to help accelerate the adoption of CAEP.
Identity Defined Security Alliance

Identity Defined Security Alliance

9393 subscribers160 talks
Vendor-neutral talks on reducing the risk of identity-related breaches
This channel brings together the leading identity and security vendors and industry experts to regularly educate security leaders on how to reduce risk through identity-centric strategies. For more resources and education on identity-centric security strategies, visit www.idsalliance.org.
Related topics