Hi [[ session.user.profile.firstName ]]

Versatile Authentication - The Real Convergence Driver

While physical and logical access control convergence has been a hot topic for many years, not many organizations have deployed a single credential that can be used for both physical access (i.e. getting into the building) and logical access (e.g. network or application login). Instead, versatile authentication has been emerged as the real convergence driver: Considering the fact that many organizations have to manage identities across multiple trusted sources (e.g. employees, partners, customers, and suppliers), it is apparent that the distinction of market segments such as employer-to-employees and business-to-customer is diluting and the need for a consistent enterprise wide approach to identity assurance develops.

The presentation will showcase current market trends in the identity management and identity assurance space, and then outline the implications for the selection of a versatile authentication platform as means to ensure trust to interact electronically with your employees, partners, suppliers, and customers, as well as a pathway to compliance.
Recorded Dec 3 2008 56 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Torsten George:Head of Global Marketing & Jerome Becquart:VP Products/Service
Presentation preview: Versatile Authentication - The Real Convergence Driver

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Implementing a NIST Framework for Adaptive Cybersecurity Mar 21 2019 5:00 pm UTC 75 mins
    Colin Whittaker, with Sam Abadir, Lockpath; and speakers from Lynx Technology Partners and Recorded Future.
    In an age where cybersecurity threats are an everyday fact of life, organizations are looking for solutions that enable them to predict, prepare and react to the shifting landscape of cyber threats, and implementation of adaptive cyber security strategies is becoming inevitable to achieve that goal.

    Adaptive cyber security methods allow for the simultaneous defense of multiple attack surfaces against this new wave of advanced cyber attacks targeting businesses and services. The NIST Cybersecurity Framework enables organizations — regardless of size, degree of cybersecurity risk, or cybersecurity sophistication — to apply the principles and best practices of risk management to improving security. Attend this CPE webinar to gain insights on:

    - Getting a clear picture of the current health of your organizations' defenses
    - Defining your security road map using NIST CSF as a framework
    - Conducting gap analysis and executing remediation actions
    - Mapping the NIST CSF with security controls and built-in reporting templates that align with the framework.
  • Critical Actions to Prevent a Data Breach in 2019 and Beyond [Recording] Mar 12 2019 5:00 pm UTC 76 mins
    Panelists: Nick Hayes, Forrester; Idan Shoham, Hitachi-ID; Jason Bonds, Ping Identity; Perry Carpenter, KnowBe4
    * This is a recording so CPE credit is unavailable.

    Today’s organizations face a cybersecurity landscape more difficult to navigate than ever before. When it comes to data breaches, the risk for organizations is high, from the easily calculable costs of notification and business loss to the less tangible effects on a company's brand and customer loyalty. With large-scale data breaches continuing to make the headlines in 2018, organizations must be proactive, not reactive, in the face of looming cyber threats. Proactive threat intelligence can enable organizations to prevent breaches or compromises before they occur.

    On this webinar our panel of experts will discuss some critical actions organisations can consider to prevent a data breach, and attendees will learn:

    - Strategies you can implement now to help you protect against a breach.
    - Best practices for gathering the intelligence to predict and prevent attacks.
    - How to use threat intelligence to improve your organization’s security posture and reduce the risk of an attack.
    - Steps to fortify your last line of defense.
  • Revitalizing Access Control Programs: Intelligent Automation Mar 7 2019 6:00 pm UTC 60 mins
    Colin Whitaker, Informed Risk Decisions; Phil Shomura, Senior Product Manager, ACL
    No organization’s suite of business applications is static, especially for businesses that have committed to non-stop innovation. It is not uncommon for businesses to integrate only their high-impact applications with their existing identity and access management (IAM) systems. This can cause a huge surge in manual work, and oftentimes enterprises dedicate hundreds of human agents to manage accounts, adding more as new business applications are added. Enterprises can sidestep significant costs, increase efficiency, manage risk and deliver undiscovered value, by properly leveraging automation technologies across IAM systems.

    Robotic process automation (RPA) is a powerful technology that harmonizes different systems across an organization’s environment, reduces human errors, provides 24/7 operations, and relieves employees from repetitive tasks so they can focus on more valuable activities. For example, data quality management in the risk and compliance processs has been a traditional pain area for many institutions, as it is very time consuming and manual. However, a cognitive RPA solution which combines machine learning capabilities can enable fast automated remediation of data quality issues, and the system can learn from the final decisions taken by the data analyst as well. Attend this CPE webinar for insights on:

    - Getting started with an access management program.
    - Evaluating the right configuration and system-based tools to automate processes at a task level, and align to your process automation strategy.
    - Leveraging advanced analytics in risk management, compliance, and continuous monitoring programs.
    - Embedding governance, risk management, and controls into your enterprise’s mobilization and deployment of RPA, so you can catch issues before they arise.
  • Best Practices for Protecting Your Business from Cybercrime Feb 19 2019 4:00 pm UTC 60 mins
    Michelle Drolet (Towerwall), Michael Thelander (Venafi), Kalani Enos (kenos)
    Cybercrime has evolved from random activities being carried out by individuals into a billion dollar illegal industry that continues to grow. How is cybersecurity keeping up with the rise of cybercrime?

    Join this panel of security experts to learn more about:
    - Trends in cybercrime and lessons learned in 2018
    - The cost of data breaches
    - Rise of cryptojacking and ransomware
    - Who are the players who make up the world of cybercrime (e.g. programmers, distributors, fraudsters, etc.)
    - The CISO vs the cybercriminal
    - Best practices for protecting your business

    - Michelle Drolet, CEO, Towerwall
    - Michael Thelander, Director of Product Marketing, Venafi
    - Kalani Enos, Founder & CEO, kenos Technologies (Moderator)
  • Top Cybersecurity Threats and 2019 Predictions Feb 19 2019 11:00 am UTC 45 mins
    Kelvin Murray, Sr. Threat Research Analyst, Webroot
    Small and medium-sized businesses are major targets for cybercriminals. To stay safe, today’s businesses must understand the different types of cyberattacks they may encounter and implement strong cybersecurity practices.

    Register for this 30-minute webinar on the key threats businesses faced this year and what's upcoming in 2019 to get details and tips that will help you keep your business and clients safe. Our Threat expert will be discussing ransomware, banking Trojans, phishing and all the crypto-crime that’s wreaking havoc on IT pros.

    Book your place and get some key insights, including:

    · 2019 Threat Landscape Predictions
    · Observed business trends (how businesses worry about the wrong threats)
    · Where stolen data/information ends up
    · Long term effects of data theft
  • Live Interview Panel: Managing Compliance and Security in the Cloud Jan 30 2019 1:00 pm UTC 60 mins
    Benny Czarny, Guy Dagan, Ariel Zeitlin, Diana Kelley
    "In the age of breaches, enterprises are looking to understand the security and compliance risks associated with data stored in, and accesible from, cloud applications so they can better prepare should the unthinkable happen. With data and workloads moving to the cloud, securing the enterprise is more critical than ever.

    Join cloud, security and compliance experts as they discuss:
    - How to proactively analyze security risk from the business perspective
    - What you need to know about your data, and how to ensure it is compliant when in the cloud
    - How to automate security policy changes
    - Top challenges for CISOs and CIOs
    - Achieving security and compliance across multiple clouds
    - Steps to take today"

    Benny Czarny, CEO and Founder, OPSWAT
    Guy Dagan, Cofounder and Partner, Consienta
    Ariel Zeitlin, CTO and co-founder, Guardicore
    Diana Kelley, Cybersecurity Field CTO, Microsoft
  • Live Interview Panel: Best Practices for Securing DevOps Jan 30 2019 11:00 am UTC 60 mins
    Ran Ilany, Guy Dagan, Bar Hofesh
    Making sure security is included at every step in the software or application development lifecycle is key in the age of breaches, data leaks and third party security risks.

    Join experts from the industry to learn more about:
    - Security challenges and vulnerabilities
    - DevOps vs DevSecOps: What's the difference?
    - How to make disjointed security and DevOps teams work effectively
    - DevOps security scans
    - Steps to better application security

    Ran Ilany, CEO, Portshift
    Bar Hofesh, CTO, NeuraLegion
    Guy Dagan, Cofounder and Partner, Consienta
  • Live Interview Panel: Strategies for Cyber Resilience in 2019 Jan 30 2019 8:30 am UTC 60 mins
    Aviv Cohen, Eddy Bobritsky, Israel Levy, Ariel Koren
    With cyber attacks and breaches on the rise, cyber resilience is becoming an area of focus for C-suite executives worldwide. It is no longer a question of "if" a breach will occur, but "when," and organizations are looking to include cyber resilience as part of their business continuity and disaster recovery programs.

    Join security and business continuity experts as they review:
    - Threats to cyber resilience and business continuity
    - Lessons from Wannacry (ransomware) and NotPetya (wiper) attacks
    - Attack trends and business preparedness
    - Steps for enterprises to take today

    Aviv Cohen, CMO, Pcysys
    Ariel Koren, CTO, SNDBOX
    Israel Levy, CEO, Bufferzone Security
    Eddy Bobritsky, Founder & CEO, Minerva Labs
  • Live Interview Panel: Top Challenges for CISOs and How to Solve Them Jan 29 2019 1:00 pm UTC 60 mins
    Aviv Grafi, Guy Dagan, Noam Erez, Kobi Freedman
    According to a recent study, having a lack of influence in the boardroom is a key reason why 84% of CISOs in North America believe there is no way to avoid a data breach. How are CISOs addressing the ever-growing cyber threat landscape, disappearing security perimeter and the chronic lack of skilled security professionals? What do they need to communicate and how, to get the board on their side?

    Join security experts across the industry for an interactive discussion on:
    - What keeps CISOs up at night
    - Strategies for breach prevention
    - Strategies for making the most of AI technolofy and human talent
    - Coping with analyst fatugue
    - Threats on the horizon
    - Recommendations for strengthening security

    Noam Erez, co-founder and CEO, XM Cyber
    Aviv Grafi, CEO and co-founder, Votiro
    Guy Dagan, Cofounder and Partner, Consienta
    Kobi Freedman, Co-founder & CEO, IDRRA
  • Live Interview Panel: IoT Cyber Attacks and Proactive Security Jan 29 2019 11:00 am UTC 60 mins
    Moshe Shlisel, Hal Lonas, Itai Tevet, Guy Dagan
    The Internet of Things is set to reach 50 billion connected devices by 2020, according to a recent Cisco report, making them an attractive target for cyber criminals who can easily use them get inside networks of organizations worldwide. Once in, attackers can easily take over and control IP-enabled devices to extract data or implant malicious code.

    Join IoT and security experts to learn more about:
    - Unique challenges of securing IoT systems
    - IoT and AI: Threats, attack trends and recommendations for basic cyber hygiene
    - Proactive security strategies to stave off the threat of IoT cyber attacks

    Hal Lonas, CTO, Webroot
    Itai Tevet, CEO, Intezer
    Moshe Shlisel, CEO and Co-Founder, GuardKnox
    Guy Dagan, Cofounder and Partner, Consienta
  • Live Interview Panel: Addressing the Cyber Threats on the Horizon Jan 29 2019 8:30 am UTC 60 mins
    Mille Gandelsman, Yoram Salinger, Guy Dagan, Elad Schulman, Kenneth Schneider
    Cyber threats continue to rise as organizations are embarking on their digital transformation journeys. The continued rise in cyber attacks is a key concern for CISOs in their efforts to protect the enterprise from financially motivated cyber criminals, as well as insider threats.

    Join security experts as they discuss:
    - New on the threat landscape
    - Notable cyber attack methods and strategies and how to protect against them
    - Areas for improvement
    - Solutions for network visibility, breach detection and response
    - Recommendations for improving security and steps to take today

    Elad Schulman, CEO, Segasec
    Yoram Salinger, CEO, Perception Point
    Mille Gandelsman, CTO and co-founder, Indegy
    Guy Dagan, Cofounder and Partner, Consienta
    Kenneth Schneider, VP Fellow, Symantec
  • IoT Series [Ep.2]: Current State -- Maturity and Success Jan 24 2019 4:00 pm UTC 60 mins
    Johna Till Johnson, CEO & Founder, Nemertes Research
    Everybody knows IoT is the wave of the future. But what are successful organizations doing differently when it comes to their IoT initiatives? Are they saving more? Generating new revenue and lines of business? Or increasing operational efficiency and other metrics?

    This webinar unveils the secrets of top-performing companies when it comes to IoT initiatives. You'll learn how they plan for, design, secure, and operate their IoT initiatives--and how they track the benefits.
  • [Earn 1 CPE] Critical Actions to Survive a Data Breach in 2019 and Beyond Recorded: Jan 17 2019 65 mins
    Colin Whittaker, Moderator. Panelists: Stephen Boyer, BitSight; Jon Siegler, LogicGate; and Justin Fier, Darktrace.
    With large-scale data breaches continuing to make the headlines in 2018, Today’s organizations face a cybersecurity landscape more difficult to navigate than ever before. When it comes to data breaches, the risk for organizations is high, from the easily calculable costs of notification and business loss to the less tangible effects on a company's brand and customer loyalty. Cyberattacks that target and infiltrate critical infrastructure are very real and for the United States, it’s not a matter of if, but when.

    Keeping your company secure is as much about detecting and responding to attacks as they occur as it is about preventing attacks before they happen. On this webinar our panel of experts will discuss THE critical actions organisations should consider to prepare for and survive any subsequent breach that may happen, and attendees will learn how to:

    - Implement security analytics for incident detection and response.
    - Quickly determine the extent of a compromise once a breach is detected, and understand the steps necessary to contain the affected systems.
    - Leverage AI to autonomously respond to emerging threats before they can do serious damage.
    - Understand key information that needs to be communicated to various stakeholders in the event of a breach.
    - Apply a “standard of due care” in order to prove compliance to regulatory agencies.
  • The Threats of 2019 Recorded: Jan 17 2019 49 mins
    Bogdan Botezatu, Director of Threat Research and Reporting, Bitdefender
    What threats can we expect to see in 2019, and how do we make sure we're prepared?

    Join Bitdefender Director of Threat Research and Reporting, Bogdan Botezatu to discuss research-based predictions on the biggest threats of 2019. He'll walk through the future of cryptojacking, advanced persistent threats (APTs), network-level exploits, IoT attacks, and others and provide recommendations on the industry's best defenses against these threats.
  • Tackling Your Biggest Threat for Free: One Active Directory Policy Recorded: Jan 17 2019 32 mins
    Helen Oswell, Cyber Security Engineer
    The biggest threat to any organization is it’s own people, particularly when they have access to its most sensitive data. This talk is about limiting the internal threat through RBAC and segregation of duties, and how to implement these using Active Directory.

    Helen has a masters in electronic engineering, specializing in machine learning. She moved into Cyber Security at 10x Future Technologies, a fintech start up founded by the ex-CEO of Barclays Anthony Jenkins. She is now working with 6point6 to provide SME services to HM Government, designing and building a number of Cyber Security tools.
  • CISO Panel - Cybersecurity and the New CISO Recorded: Jan 16 2019 59 mins
    Gary Hayslip (Webroot) | Dan Lohrmann (Security Mentor) | Mark Weatherford (vArmour) | Amos Stern (Siemplify)
    Learn how the role of Chief Information Security Officer (CISO) has changed in the age of data breaches and high-profile cyber attacks.

    Join well-known CISOs at the top of their game for an interactive discussion on:
    - How the role of CISO has changed in the last few years
    - Hiring and retaining a CISO
    - Top challenges for CISOs
    - Dealing with stress & pressure associated with the role
    - How to keep your security team happy
    - Tools, technology and policies CISOs swear by
    - What keeps CISOs up at night
    - Why leadership buy-in is essential to boost cybersecurity
    - Future trends and predictions

    - Gary Hayslip, CISO, Webroot
    - Mark Weatherford, Chief Cybersecurity Strategist, vArmour
    - Dan Lohrmann, Chief Strategist & CSO, Security Mentor
    - Amos Stern, CEO, Siemplify

    This exclusive CISO webinar originally aired during National Cyber Security Awareness Month (NCSAM).
  • Security Strategy & Influence Recorded: Jan 15 2019 38 mins
    Max Aulakh, CEO, Ignyte Assurance Platform
    Every organization has a strategy – sometimes this is explicitly stated within various organizational documents and other times the strategic objectives are held within the minds of executive leadership. CISOs today are struggling to find the right words and narrative to set the tone from the top. How do you properly extract the right type of information from your organization that will help you build a consensus and influence with your top-level management?

    As a CISOs, you need to acquire a new set of skills while maintaining your technical trench warfare knowledge (Frameworks, SIEMs, DLP, MDR, etc..). In this presentation, Max Aulakh (CEO) will present broad range of skills that are needed for the next CISO. We will also examine behaviors of some of the well known CISOs in our industry and how they interact & build influence to gain consensus.
  • Best Practices for Securing Your Organization in 2019 Recorded: Jan 15 2019 59 mins
    Griff James (Damrod Analysis); Michelle Drolet (Towerwall), Liam Brown (Lockton)
    Data breaches are on the rise and getting their fair share of media attention. It is no longer a question of "if", but "when" an organization will get breached. So, how are organizations preparing for the inevitable?

    Join this roundtable discussion with security experts to learn more about:
    - Trends in cyber attacks and breaches and what's at risk
    - Prevention best practices
    - Solution recommendations for breach detection and response
    - Key factors for CISO success
    - What's on the horizon for 2019

    - Griff James, Director, Damrod Analysis Ltd.
    - Michelle Drolet, CEO, Towerwall
    - Liam Brown, Cyber Risk Specialist, Lockton Companies
  • Survival Skills for Cybersecurity Leaders Recorded: Jan 15 2019 60 mins
    Glenn Richardson, Executive Coach, LeaderSages
    Start the new year on the right foot by investing in yourself and improving your leadership skills. Join Glenn Richardson, coach and executive consultant, in this webinar that will explore the principles of leadership. We will review practical tips, supported by real-world examples, from an experienced, successful leader who specializes in coaching and developing new and emerging leaders. Gain confidence in your ability to learn and lead, and, if you’re already in a leadership role or approaching a new position with leadership expectations - congratulations! Join us on this webinar to develop a plan for continue learning, improvement and career advancement.
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Versatile Authentication - The Real Convergence Driver
  • Live at: Dec 3 2008 12:30 am
  • Presented by: Torsten George:Head of Global Marketing & Jerome Becquart:VP Products/Service
  • From:
Your email has been sent.
or close