Hi [[ session.user.profile.firstName ]]

Security in the Cloud: Identity Management, Access Control and Authentication

Organisations increasingly rely on cloud services, motivated by the benefits of scalability, accessibility, flexibility, business efficiencies and reduced IT costs. However, there are several security implications that organisations need to address, including the challenge of verifying identity and managing access to cloud services.

Cloud services bring added complexity to identity and access management, exacerbated by the distribution of data across a myriad of applications accessed by users from multiple devices and locations. Failure to adequately implement user authentication and access control in the cloud can be exploited by attackers to gain access to users’ credentials, manipulate systems and compromise data.

In this webinar, Senior Research Analyst Dr Emma Bickerstaffe and Principal Analyst Benoit Heynderickx will discuss identity management, access control and user authentication in the cloud environment, and consider how organisations can effectively tackle this security concern.
Live online Oct 23 12:00 pm UTC
or after on demand 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Emma Bickerstaffe, Senior Research Analyst and Benoit Heynderickx, Principal Analyst, ISF LTD
Presentation preview: Security in the Cloud: Identity Management, Access Control and Authentication

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Cyber Security Planning and Strategy for 2019 Dec 13 2018 6:00 pm UTC 60 mins
    Sushila Nair (NTT DATA Services) | Panelists TBA
    Discover the cyber security attack trends that will shape your security planning and budgets for 2019. Discover what's new on the threat horizon, how businesses are coping and the key areas for improvement. Learn about the latest technologies enabling stronger and more resilient enterprises.

    Join this keynote panel of security experts and industry veterans as they discuss:
    - New on the threatscape
    - Cyber attack trends seen in 2018
    - Addressing your cyber risk
    - How to prepare for 2019
    - Security strategy and making the most of your security dollars
    - New leaps in technology
    - Best practices and recommendations

    Speakers:
    - Sushila Nair Sr. Director Security Portfolio, NTT DATA Services
    - Panelists TBA
  • Social Engineering, Phishing and Protecting the Enterprise Dec 13 2018 4:00 pm UTC 60 mins
    Jan Liband (SlashNext) | John Bambenek (ThreatSTOP) | JP Bourget (Syncurity)
    This webinar is part of the 2019 Trends and Predictions series on BrightTALK.

    Join top security leaders for an interactive discussion on how to better secure the enterprise in 2019:
    - Top threats on the horizon and what's at risk
    - Cyber defenses and your employees
    - Basic cyber safety recommendations to protect against social engineering, phishing and email cyber attacks
    - Use cases and examples
    - Actions to take today to protect your employees and enterprise from cyber criminals
    - What to expect in 2019

    Speakers:
    - John Bambenek, VP Security Research & Intelligence, ThreatSTOP
    - JP Bourget, Founder & Chief Security Officer, Syncurity
    - Jan Liband, CMO, SlashNext
  • Trends in Cyber Attacks and Breaches Dec 11 2018 1:00 pm UTC 45 mins
    Steve Durbin, Managing Director, ISF LTD
    As the scale, sophistication, and targeting of cyber-attacks increase, organisations need to manage risk in ways beyond those traditionally handled by the information security function.

    In this webinar, Steve Durbin, Managing Director at the ISF will offer his insights into how security and business teams across the entire organisation can work together to minimise the impact of a breach, in order to protect organisations from damaging shareholder value and business reputation.


    About the presenter

    Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.
  • [Earn 1 CPE] Critical Actions to Prevent a Data Breach in 2019 and Beyond Nov 29 2018 6:00 pm UTC 75 mins
    Panelists: Idan Shoham, Hitachi-ID; Bernard Harguindeguy, Ping Identity; Perry Carpenter, KnowBe4
    Today’s organizations face a cybersecurity landscape more difficult to navigate than ever before. When it comes to data breaches, the risk for organizations is high, from the easily calculable costs of notification and business loss to the less tangible effects on a company's brand and customer loyalty. With large-scale data breaches continuing to make the headlines in 2018, organizations must be proactive, not reactive, in the face of looming cyber threats. Proactive threat intelligence can enable organizations to prevent breaches or compromises before they occur.

    On this webinar our panel of experts will discuss some critical actions organisations can consider to prevent a data breach, and attendees will learn:

    - Strategies you can implement now to help you protect against a breach.
    - Best practices for gathering the intelligence to predict and prevent attacks.
    - How to use threat intelligence to improve your organization’s security posture and reduce the risk of an attack.
    - Steps to fortify your last line of defense.
  • Around the World with Privacy and Your Business Nov 15 2018 4:00 pm UTC 60 mins
    Victoria McIntosh, Information and Privacy Professional, MLIS,CIPT, Information in Bloom Management Services
    Planning on doing business overseas? Establishing a new office in a foreign land, or selling online to consumers in a new country? When going over company requirements for working in your new neighbourhood, don’t forget to review corporate privacy practices.

    When it comes to privacy, expectations, safeguard minimums and rights of the data subject can vary between jurisdictions. From Canada and the United States, the European Union with its new GDPR, Japan, Australia, even between China and Hong Kong, there’s no single set of global standards. Fortunately however, many privacy legislations do contain common ground. There are also ways to proactively account for the differences.

    Information and Privacy Professional Victoria McIntosh presents a taste of privacy across the globe, with some of the ways businesses can prepare in dealing with data across borders.
  • The State of Identity and Security in the Age of Cyber Attacks Nov 14 2018 4:00 pm UTC 60 mins
    Sushila Nair (NTT DATA Services) | Derek Hanson (Yubico)
    Cyber attackers are becoming more sophisticated and data breaches are on the rise. According to a recent report, over 4.6 billion records were breached in the first half of 2018, showing a 133% increase compared to last year.

    With sensitive, personal and confidential data being at risk of ending up in the hands of cyber criminals, enterprises of all sizes are looking to strengthen their security in 2019.

    Join this exclusive keynote panel of industry experts as they discuss:
    - Trends in cyber attacks and breaches
    - Who is at risk
    - How to prevent breaches, data theft and future cyber crime
    - Advances in authentication
    - New in identity and access management
    - Security awareness and training
    - Best practices for securing the enterprise

    Speakers:
    - Sushila Nair, Sr. Director Security Portfolio, NTT DATA Services
    - Derek Hanson, Sr. Director Solutions Architecture & Standards, Yubico
  • How to turn customer experience into customer trust Nov 13 2018 6:00 pm UTC 60 mins
    Louise Thorpe, Chief Privacy Officer, American Express
    Forrester found that only 11 percent of companies are able to deliver a customer experience (CX) that sets them apart from their competition. Without a CX that elevates the brand, companies are at risk of being left behind while customers choose to spend their purchase dollars or business investments elsewhere.

    There are four key ways to ensure that your CX is flawless and your market share keeps growing. It starts from the inside out, with a unified vision of CX; a strategy to solve problems fast while offering self-help; continuous, ongoing iteration and improvement of best practices, and a consistent, personalized experience in every way.

    To learn more about why CX has to be the core of your company and how to launch the strategy that ensures your company maintains competitive advantage, don’t miss this VB Live event!

    Register here for free.

    Webinar attendees will learn:
    * How to build trust with increasingly savvy consumers
    * Why brand reputation is your most important calling card -- and how to protect it
    * The key qualities customers look for in a trusted brand
    * The secrets of the modern customer-focused organization

    Speakers:
    * Louise Thorpe, Chief Privacy Officer, American Express
    * Andrew Leede, Product Owner, Blinker
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by Docusign
  • Securing Your Cloud Networks Nov 7 2018 10:00 am UTC 60 mins
    TBC
    Join this live panel discussion with experts at VMworld Europe for all things virtual and cloud networking; from security, network virtualization and beyond.

    Tune into this interactive Q&A session with world renowned Data Center, Cloud, Virtualization, and Infrastructure experts as they discuss the following:

    - How to secure your application infrastructure and the role of micro-segmentation
    - How to ready today's cloud network for tomorrow's demands
    - How technologies like SD-WAN and IoT are extending beyond the data center to the edge, and what that means for your customers

    This live panel will be streamed directly from VMworld Europe in Barcelona! Join us for live Q&A from the comfort of your desk.
  • CIO Considerations: The Impact of Platformification in Bank Risk and Compliance Nov 1 2018 3:00 pm UTC 60 mins
    Rupert Nicolay - Microsoft, Zannettos Zannettou - Finastra
    Risk management in banks has gone through a silent revolution. Banks had to solve the problems and questions asked post-crisis and then rationalize and move to more enterprise wide models. Today, a three pronged revolution of regulation, technology and new sources of risk mean banks must re-imagine risk and compliance. With platformification, increases in computing power and cloud come the opportunities to deliver more agile processes, more real-time insights and more accurate predictions. But data quality remains king. What are CIOs top considerations when deploying more open api driven risk platforms? Can risk management securely live in the cloud? How can banks move the needle by collaborating with the fintech ecosystem?

    Rupert Nicolay, Worldwide Services Architect, Microsoft
    Zannettos Zannettou, Principal Technology Consultant, Finastra
  • CISO Panel - Protecting Critical Infrastructure in the Age of Threats Oct 30 2018 4:00 pm UTC 60 mins
    Dan Lohrmann (Security Mentor) | Chris Morales (Vectra) | Dave Klein (GuardiCore)
    This webinar is part of BrightTALK's coverage of the 15th National Cyber Security Awareness Month (NCSAM).

    Join CISOs and other security leaders for an interactive discussion on how to better secure our critical infrastructure:
    - Top threats on the horizon and what's at risk
    - Key vulnerabilities & how advancements in technology have changed the game
    - Threat intelligence & what needs to be improved now
    - What government agencies can learn from the private sector about cybersecurity
    - Recommendations for protecting critical infrastructure from attacks and subversion by online adversaries
    - What to expect in 2019

    Speakers:
    - Dan Lohrmann, Chief Strategist & Chief Security Officer (CSO), Security Mentor
    - Chris Morales, Head of Security Analytics, Vectra Networks
    - Dave Klein, Sr. Director, Engineering & Architecture, GuardiCore
  • CISO Panel - Cybersecurity and the New CISO [NCSAM] Oct 29 2018 4:00 pm UTC 60 mins
    Gary Hayslip (Webroot) | Dan Lohrmann (Security Mentor) | Mark Weatherford (vArmour) | Amos Stern (Siemplify)
    This webinar is part of BrightTALK's coverage of the 15th National Cyber Security Awareness Month (NCSAM).

    Learn how the role of Chief Information Security Officer (CISO) has changed in the age of data breaches and high-profile cyber attacks.

    Join well-known CISOs at the top of their game for an interactive discussion on:
    - How the role of CISO has changed in the last few years
    - Hiring and retaining a CISO
    - Top challenges for CISOs
    - Dealing with stress & pressure associated with the role
    - How to keep your security team happy
    - Tools, technology and policies CISOs swear by
    - What keeps CISOs up at night
    - Why leadership buy-in is essential to boost cybersecurity
    - Future trends and predictions

    Speakers:
    - Gary Hayslip, CISO, Webroot
    - Mark Weatherford, Chief Cybersecurity Strategist, vArmour
    - Dan Lohrmann, Chief Strategist & CSO, Security Mentor
    - Amos Stern, CEO, Siemplify
  • Cloud Security Trends and Best Practices for 2019 Oct 23 2018 3:00 pm UTC 60 mins
    Dave Klein (GuardiCore) | Prof Avishai Wool (Algosec) | Fred Streefland (Palo Alto Networks)
    As more corporate data moves to the cloud, the new challenge is to efficiently manage security in both the cloud and on premises. How are organizations coping and what are the solutions they should be employing?

    Join this keynote panel of security and cloud experts as they discuss:
    - Cloud security challenges today
    - Extending network security to the cloud
    - Security policy management in the cloud
    - Security automation
    - Best practices and recommendations for improving your enterprise security posture
    - Future trends in cloud security

    Speakers:
    - Dave Klein, Sr. Director Engineering & Architecture, GuardiCore
    - Prof Avishai Wool, CTO & Co-founder, Algosec
    - Fred Streefland, Chief Security Officer North & East-Europe (NEEUR), Palo Alto Networks
  • Security in the Cloud: Identity Management, Access Control and Authentication Oct 23 2018 12:00 pm UTC 45 mins
    Emma Bickerstaffe, Senior Research Analyst and Benoit Heynderickx, Principal Analyst, ISF LTD
    Organisations increasingly rely on cloud services, motivated by the benefits of scalability, accessibility, flexibility, business efficiencies and reduced IT costs. However, there are several security implications that organisations need to address, including the challenge of verifying identity and managing access to cloud services.

    Cloud services bring added complexity to identity and access management, exacerbated by the distribution of data across a myriad of applications accessed by users from multiple devices and locations. Failure to adequately implement user authentication and access control in the cloud can be exploited by attackers to gain access to users’ credentials, manipulate systems and compromise data.

    In this webinar, Senior Research Analyst Dr Emma Bickerstaffe and Principal Analyst Benoit Heynderickx will discuss identity management, access control and user authentication in the cloud environment, and consider how organisations can effectively tackle this security concern.
  • Cloud Strategy & Improving Your Enterprise Security Posture in 2019 Oct 22 2018 5:00 pm UTC 60 mins
    Sushila Nair (NTT DATA Services) | Yonatan Klein (AlgoSec) | Diana Kelley (Microsoft)
    This keynote panel is part of Cloud Month on BrightTALK.

    Join this keynote panel of security and cloud experts as they discuss:
    - The most prevalent security risks and challenges and how to contend with them
    - Your cloud strategy and how it affects your overall security posture
    - How to extend network security to the cloud
    - Areas for automation
    - Best practices on how to secure your enterprise in 2019

    Speakers:
    - Sushila Nair Sr. Director Security Portfolio, NTT DATA Services
    - Diana Kelley, Cybersecurity Field CTO, Microsoft
    - Yonatan Klein, Sr. Product Manager, Algosec
  • Q4 2018 BrightTALK Community Update - IT Security Oct 18 2018 3:00 pm UTC 60 mins
    Dave Klein (GuardiCore) | Jay Beale (InGuardians) | Marija Atanasova (BrightTALK)
    Discover what's trending in the IT Security community on BrightTALK and how you can leverage these insights to drive growth for your company. Learn which topics and technologies are currently top of mind for security professionals and decision makers.

    Tune in with Dave Klein, Senior Director of Engineering & Architecture at GuardiCore and Marija Atanasova, Senior Content Manager for IT Security at BrightTALK, to discover the latest trends in the community, the reasons behind them and what to look out for in Q4 2018 and beyond.
    - Top trending topics in Q3 2018 and why
    - Key events in the community
    - Content security professionals care about
    - What's coming up in Q4 2018

    Audience members are encouraged to ask questions during the Live Q&A.

    Speakers:
    - Dave Klein, Sr. Director of Engineering & Architecture, GuardiCore
    - Jay Beale, Principal Security Consultant, CTO, and COO, InGuardians
    - Marija Atanasova, Sr. Content Strategist, BrightTALK
  • When Biometrics Simply Don't Cut It Recorded: Oct 10 2018 61 mins
    Ehab Samy, Vice President of Product Management for Plurilock
    Identifying a user through fingerprints, facial recognition or iris scanning is simply not enough for today's digital age. Join us to learn about the shift from point-in-time identification to behavioral biometrics and how it is impacting today's workforce. Ehab Samy, Vice President of Product Management for Plurilock, will explore game-changing practices in continuous authentication and identity management to control access to physical spaces, applications, and government services.
  • CISO Panel - Best Practices for Cyber Hygiene [NCSAM] Recorded: Oct 4 2018 61 mins
    Gary Hayslip (Webroot) | Joseph Kucic (Cavirin) | Dan Lohrmann (Security Mentor)
    This webinar is part of BrightTALK's coverage of the 15th National Cyber Security Awareness Month (NCSAM).

    Discover the basic cyber hygiene practices your organization should have in place to drastically reduce your risk exposure.

    Join well-known CISOs at the top of their game for an interactive discussion on:
    - How to achieve basic cyber hygiene
    - Best practices for minimizing your cyber risk
    - Cybersecurity awareness & employee training
    - Ethical hacking
    - Cyber insurance

    Speakers:
    - Gary Hayslip, CISO, Webroot
    - Joseph Kucic, CSO, Cavirin Systems
    - Dan Lohrmann, Chief Strategist & CSO, Security Mentor
  • Privacy & Security in the Age of IoT Recorded: Oct 2 2018 61 mins
    Elena Elkina (Aleada Consulting ) | Parnian Najafi Borazjani (FireEye) | Ondrej Krehel (LIFARS) | John Bambenek (ThreatSTOP)
    This webinar is part of BrightTALK's Privacy Insights Series and National Cyber Security Awareness Month (NCSAM).

    With the proliferation of the Internet of Things into every sphere of our lives, it's now more important than ever to understand the security and privacy risks associated with connected devices. With smart home devices, office tools, children's toys, even medical devices being vulnerable to cyber attacks, becoming cyber aware should be a key priority for everyone.

    Join privacy and cyber security experts for an interactive panel roundtable discussion on:
    - The privacy and security vulnerabilities and risks stemming from IoT devices
    - The basic safety measures you can deploy to protect your home and workplace against cyber threats
    - Best practices for privacy and security safeguards
    - What to do in the event of a breach
    - What the future of privacy looks like

    Speakers:
    - Elena Elkina, Partner at Aleada Consulting
    - Parnian Najafi Borazjani, Senior Analyst, FireEye
    - Ondrej Krehel, Digital Forensics Lead, CEO & Founder, LIFARS
    - John Bambenek, VP Security Research & Intelligence, ThreatSTOP

    Audience members are encouraged to send questions to the speakers to be answered during the live session.
  • CISSP Exam Prep Clinic #5: Difference between CISSP and CISSP Associate status Recorded: Sep 29 2018 28 mins
    Mission Critical Institute
    Learn about the CISSP employment endorsement and the CISSP Associate Status.

    In Clinic #5, you will learn about the CISSP employer endorsement and how it works. You will also learn what happens when you pass the exam but still cannot meet all of the CISSP employment requirements. Specifically, you receive information about the CISSP Associate status and how employers will respond to you when you pass the exam and still need more experience.


    If you want to pass your CISSP Exam the first time, you’ll want to attend and then review this series of five live online CISSP Exam Prep Clinics. In these five valuable CISSP exam clinics you will learn about:

    • The new CISSP exam format, the “adaptive exam format”
    • How hands-on labs will help you prepare for your exam
    • Tactics to select the best answer for each question
    • How to get your employment endorsement and what happens if you need more experience

    These five Clinics include tips for all 8 CISSP domains covered in the exam.

    Register today and move closer to your goal!

    SPONSORED BY: Mission Critical Institute
  • [Earn 1 CPE] Compliance vs Risk: Aligning Priorities & Prioritizing Threats Recorded: Sep 27 2018 62 mins
    Colin Whittaker, Moderator. Stephen Boyer, CTO at BitSight; Marc French, SVP at Mimecast; Scott Petry, CEO at Authentic8.
    Compliance is a fundamental pillar to effective risk management at any company. However, simply complying with laws and regulations without considering the broader threat landscape can result in disaster. Certainly, a balance between compliance and risk is necessary. Ensuring compliance represents an organization's starting point, not the endgame, should be a priority.

    In a dynamic threat environment, forward-thinking organizations have concluded that the goal of total protection is elusive and that a risk-based approach to governance and management of cybersecurity is necessary. That is easier said than done, as the way most information security professionals measure risk today fails to quantify threats in terms the business can understand and use. In this CPE accredited webinar, our panel of experts will discuss:

    - Aligning risk and compliance metrics and controls across functional domains.
    - Benchmarking existing process for managing the risks identified by stakeholders.
    - Creating a transparent 'system of record' and collaborative process life-cycle management system.
    - Prioritizing control efforts accordingly.
    - Aligning compliance investments with compliance risk ratings and business priorities.
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Security in the Cloud: Identity Management, Access Control and Authentication
  • Live at: Oct 23 2018 12:00 pm
  • Presented by: Emma Bickerstaffe, Senior Research Analyst and Benoit Heynderickx, Principal Analyst, ISF LTD
  • From:
Your email has been sent.
or close