Hi [[ session.user.profile.firstName ]]

Solving the Other Two Thirds of your Identity Challenge

Privileged password management is a sub-category of an overall Identity Management effort but comprises two thirds of your identity challenge. Privileged passwords can be used by administrators and/or applications and the policies that govern their use are entirely different from end-user passwords. The number of privileged passwords residing on your network can be 2 to 3 times the number of your end-user passwords. This webinar will explain the privileged password compliance issue and an approach to solving the challenge of managing these passwords.
Recorded Dec 2 2008 25 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Robert Grapes, Chief Technologist, Datacenter Solutions, Cloakware, Inc.
Presentation preview: Solving the Other Two Thirds of your Identity Challenge

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Day When 3rd Party Security Providers Disappear into Cloud Sep 26 2019 4:00 pm UTC 60 mins
    Ulf Mattsson, Head of Innovation, TokenEx
    How should we prepare for this new brave world where many 3rd party security providers disappeared into cloud providers? This will greatly impact many 3rd party security vendors, organizations and investors.

    Cloud transformations are accelerating. By 2020, cloud will increase by 157% and on-premises ’traditional’ IT infrastructure will decrease by 54%, according to 452 Research, 2018.

    We will cover how many security solutions will change, including:
    - WAF – Web Application Firewalls
    - SIEM
    - Firewalls
    - Encryption
    - Tokenization
    - Key Management
    - AV – Anti Virus
    - Network
    - And more...
  • Emerging Application and Data Protection for Multi-cloud Sep 25 2019 3:00 pm UTC 60 mins
    Ulf Mattsson, Head of Innovation, TokenEx
    With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced identity and data protection solutions has become even more critical.

    Join this webinar to learn more about:
    - Data Protection solutions for the enterprise
    - Trends in Data Masking, Tokenization and Encryption
    - New Data Protection Standards from ISO and NIST
    - The new API Economy and how to control access to sensitive data — both on-premises, and in public and private clouds
    - The llatest developments in IAM technologies and authentication
  • Is Security a Hinderance to DevOps Sep 25 2019 10:00 am UTC 45 mins
    Simon Roe, AppSec Product Manager, Outpost24
    For busy development teams and information security professionals, it can be challenging to keep pace with DevOps code and cloud migration whilst staying on top of security. As we look at the 'shift left' approach and wok to locate defects early in the SDLC, Simon Roe, AppSec Product Manager at Outpost24 will discuss the pitfalls you may face when migrating to cloud and how to overcome them.
  • [PANEL] Protecting & Maintaining Cloud Security Sep 24 2019 3:00 pm UTC 60 mins
    Ed Moyle (Prelude Institute) | Nathan Burke (Axonius) | Raef Meeuwisse, ISACA Expert Speaker (Cybersecurity for Beginners)
    As organizations are forced to adapt to the world around them, the amount and severity of threats continues to increase. In order to ensure security in the cloud, it is vital to protect and maintain IT systems and devices in the office and remotely. Join this panel of industry experts as they discuss cloud cyber hygiene strategies and solutions, including:

    - Cloud security protocol best practices
    - Strategies for cloud security success
    - IT Security hygiene in real time
    - Tools and technology to ensure cloud hygiene

    - Ed Moyle, General Manager and Chief Content Officer, Prelude Institute
    - Nathan Burke, CMO Axonius
    - Raef Meeuwisse, ISACA Expert Speaker & author Cybersecurity for Beginners
  • Strategies to Architect Security for Private, Hybrid, and Public Clouds Sep 23 2019 6:00 pm UTC 60 mins
    Predrag "Pez" Zivic, Sr. Security Solutions Architect
    World of kubernetes and cloud is very different from traditional data center world. This talk will address the differences between the two worlds for security professionals.

    The information about what security architects need to think about when designing overarching security architecture will be explored. Important foundational comparisons of different cloud-native architecture design and data center architecture will be reviewed. Distributed and centralized characteristics of the two different environments will be considered for security architecture design.

    Architecture attributes of cloud-native security architecture versus legacy data center security architecture will be reviewed. Ideas on how to alter security architecture models to meet dynamic nature of cloud technologies will be explored.

    This session will equip security architects with facts that will help them design future security implementations.
  • [PANEL] Multiple Clouds, Multiple Concerns - Best Practices for Cloud Security Sep 23 2019 3:00 pm UTC 60 mins
    Jo Peterson, Clarify360 | Manon Buettner, Nuvalo | Michelle Ruyle, Optimized Channel
    According to Forrester's Cloud Security Solutions Forecast 2018 to 2023 report, the global spend for cloud security technologies will reach $12.7 billion by 2023, mostly driven by financial services organizations. This spend likely won't flow into a single vendor, as organizations are increasingly relying on several options for securing their clouds.

    Join this keynote panel of experts to learn more about the biggest trends in cloud security, as well as the best practices for securing your multi clouds:
    - Crucial steps companies should be taking as they move data and processes to multiple cloud environments
    - Understanding the shared responsibility model in the context of infrastructure-as-a-service (IaaS), software-as-a-service (SaaS), and platform-as-a-service (PaaS)
    - Protecting and planning for the future

    Jo Peterson, Vice President, Cloud and Security Services, Clarify360

    Manon Buettner, CEO & Co-Founder, Nuvalo
    Michelle Ruyle, CEO & Founder, Optimized Channel
  • [PANEL] Email Security Strategies and Solutions Sep 19 2019 3:00 pm UTC 60 mins
    Panelists TBA
    With email security breaches constantly making headlines, it is crucial for organisations to be ahead of the curve. Join this interactive panel of industry experts as they discuss the latest trends in email security and how to prevent becoming the next international headline.

    Join this Q&A panel to learn more about:

    -Emerging trends in email attacks
    -How to stay on top of the latest threats
    -Best solutions to protect your organisation
  • Machine Learning and AI in a Brave New Cloud World Sep 18 2019 5:00 pm UTC 60 mins
    Ulf Mattsson, Head of Innovation, TokenEx
    Machine learning platforms are one of the fastest growing services of the public cloud. ML, an approach and set of technologies that use Artificial Intelligence (AI) concepts, is directly related to pattern recognition and computational learning. Early adopters of AI have now rolled out cloud-based services that are bringing AI to the masses.

    How are AI, deep learning, machine learning, big data, and cloud related? Can machine learning algorithms enable the use of an individual’s comprehensive biological information to predict or diagnose diseases, and to find or develop the best therapy for that individual? How is Quantum Computing in the Cloud related to the use of AI and Cybersecurity?

    Join this webinar to learn more about:
    - Machine Learning, Data Discovery and Cloud
    - Cloud-Based ML Applications and ML services from AWS and Google Cloud
    - How to Automate Machine Learning
  • [PANEL] Getting Ready for CCPA Sep 17 2019 5:00 pm UTC 60 mins
    Elena Elkina | Lisa Hawke
    The California Consumer Privacy Act (CCPA) is going into effect on January 1, 2020, making it America’s first-ever state data privacy law. It is also the most far-reaching privacy regulation in the U.S. to date.

    Join this panel of experts for an interactive Q&A session to learn more about what businesses need to do to prepare for CCPA. Attendees will also learn about the CCPA checklist, as well as dive into:
    - GDPR vs. CCPA
    - Which organizations need to plan for CCPA compliance
    - What to do to avoid the risk of fines
    - How to develop a strategy and start implementing tools to achieve compliance
    - More privacy legislation on the horizon

    - Elena Elkina, Partner, Aleada Consulting
    - Lisa Hawke, VP Security and Compliance, Everlaw
  • [Earn CPE] Preventing Data Breaches with a Scalable Verification Program Sep 10 2019 5:00 pm UTC 75 mins
    Panelists: Nathan Rowe, Evident ID; Jeremy Grant, the Better Identity Coalition; Jon Lehtinen, Thompson Reuters.
    Consumer demand is driving the corporate IT environment. Business demands for IT are changing rapidly — so too are the demands on IAM — resulting in the requirement to adopt emerging technologies (e.g., mobile and cloud computing, data loss prevention, and social media) earlier and more quickly. Scalability is critical for any business that wants to catalyze short- and long-term success. A flexible workflow for identity verification can help organizations of all sizes with limited time, resources, and funding to focus their efforts on initiatives that support positive growth. While your business might be conducting background checks today, it could have different verification needs in the future to ease onboarding friction, prevent data breaches, and demonstrate regulatory compliance.

    It’s important to begin laying the groundwork now for a more sophisticated and intricate verification program so you can be proactive, not reactive, but what does a scalability strategy look like? In this CPE accredited panel webinar our experts will address how to create identity and credential verification workflows that can scale with your organization as it grows, including how to:

    - Gain a better understanding of the digital identity landscape,
    - Ensure accuracy of both data sources and verification records,
    - Centralize verification of multiple data sources into a unified platform,
    - Evaluate new developments like biometrics, AI, and blockchain, and how they can impact identity and data management,
    - Save money in the long-term by laying the groundwork for adaptable online verification workflows,
    - Adapt and respond to new regulations.
  • CCS[Ep1]: Next-Generation Cybersecurity - Success Metrics, Best Practices & More Sep 5 2019 3:00 pm UTC 60 mins
    Johna Till Johnson, CEO & Founder, Nemertes Research
    Cloud & Cybersecurity Series [Ep.1]: Success Metrics, Best Practices & More

    What does it take for enterprise cybersecurity teams to "up their games" to the next level of cybersecurity? What does it mean to be a "successful" cybersecurity organization, and what technologies and practices does it take to become one?

    This webinar presents the highlights of Nemertes' in-depth research study of 335 organizations in 11 countries across a range of vertical industries.

    We separated the best from the rest, and took an in-depth look into what made the most successful organizations that way. Participants will come away with best practices, tools, technologies, and organizational structures that contribute to success. Most importantly, they'll learn how to measure cybersecurity success--and their progress towards it.
  • [PANEL] Proactive Security Strategies and Best Practices Sep 3 2019 3:00 pm UTC 60 mins
    Panelists TBA
    In today’s business landscape it is important to take a proactive approach to security rather than a reactive approach. Join leading security experts as they discuss the safest ways to protect your organisation in 2019 and beyond.

    Join this Q&A panel to learn more about:

    - Key organisational benefits to practising proactive security
    - Technologies powering security
    - Best practices and recommendations for a more secure organization
  • Breach Detection and Response - The whole business challenge Aug 30 2019 10:00 am UTC 45 mins
    Ade Taylor, CTO, ITC Secure
    Technical detection is now just the starting point for a series of exercises which will see the entire business work together to identify what happened and to mitigate the results.

    In this session, you will learn:

    - How EDR and MDR are morphing into BDR
    - Why BDR is a challenge for the whole business
    - How technology can help, and how it doesn’t

    In this 30 minute webinar Ade will discuss how the world of cyber-security detection and response is changing, fast. From IT and technical analysts to the CEO via HR, this is a problem for the whole business to solve together.
  • [PANEL] Security as a Service Aug 29 2019 3:00 pm UTC 60 mins
    Panelists TBA
    As in-house security becomes increasingly complex and costly, organizations are in need of a reliable and safe security provider. Join industry experts as they discuss the latest trends in SEaaS, including:

    -Why your organisation needs to move towards SEaaS
    -The different models of security as a service
    - SEaaS solutions and strategies
  • ICE [Ep.2]: Top 5 'Must-Haves' for Your Next-Generation Contact Center Aug 29 2019 3:00 pm UTC 60 mins
    Robin Gareiss, President & Founder, Nemertes Research
    Intelligent Customer Engagement Series [Ep.2]: Top 5 'Must-Haves' for Your Next-Generation Contact Center

    Contact centers are changing--drastically and swiftly. If you're not keeping pace--or exceeding it--you'll be at a competitive disadvantage.

    Learn what successful companies are doing with areas such as agent experience, interaction channels, and emerging technologies.

    Based on Nemertes' brand new, detailed, Customer Experience research study with 518 organizations, this webinar will explain the five crucial items that must be on your priority list to ensure your contact center is positioned to deliver successful customer experiences.
  • Managing Your Organization's Cyber Risk as a Service Aug 29 2019 3:00 pm UTC 60 mins
    Troy Vennon, Director of Security Innovation, the Columbus Collaboratory
    Join us for this webinar that will demonstrate how your organization can adopt best practices for vulnerability management, threat intelligence and cyber risk management that previously had been beyond your means. For various reasons - tight budgets, lack of skills or resources, or a focus on other priorities - most companies perform vulnerability, threat and risk management in a very tactical way. Join Troy Vennon, Director of Security Innovation at the Columbus Collaboratory, for this session outlining how the the combination of cloud-based vulnerability management, threat analysis and risk assessment, bundled with expert reporting and guidance for your specific IT environment, will cost-effectively transform your security operations from the tactical to the strategic.
  • Why Cybersecurity and Physical Security Belong Together Aug 28 2019 5:00 pm UTC 60 mins
    Min Kyriannis, Head of Cybersec, Jaros, Baum & Bolles & Valerie Thomas, Exec Information Security Consultant, Securicon
    In this webinar from Women in CyberSecurity (WiCyS) and the Security Industry Association (SIA), cybersecurity consultants Min Kyriannis (Jaros, Baum & Bolles) and Valerie Thomas (Securicon) will explore the important relationship between cybersecurity and physical security.

    Drawing lessons from real-world threats and attacks, our speakers will look at how cybersecurity vulnerabilities can be used to compromise physical security systems and why cybersecurity of IT systems depends on controlling physical security. We’ll discuss why CSOs, IT leaders, cybersecurity professionals and vendors/service providers all need to be paying attention to the cybersecurity of physical systems, and we’ll discuss what it means to drive security convergence at both strategic and operational levels, and how new technologies like AI factor into today’s converged security models.

    Key Focuses:
    •How to evaluate and improve the cybersecurity of cyber-physical systems
    •How threat actors are targeting cyber weaknesses in physical security systems
    •Why security convergence matters and what the relationship between cybersecurity and physical security teams can look like
    •How new technologies like AI are evolving security

    Key Topics: Cybersecurity, Physical security, Security convergence, Hacking, Hackers, cyber-physical systems, Security management
  • Why Join an ISAO? The Network Effects of Threat Intelligence Sharing Aug 27 2019 6:00 pm UTC 60 mins
    Troy Vennon, Director of Security Innovation, the Columbus Collaboratory
    Join us for this webinar presenting the benefits of networking with your industry peers to share intelligence about threats and vulnerabilities. In today's environment where the threats seem to intensify, it's critical to know who to trust. During this session, Troy Vennon, Director of Security Innovation at the Columbus Collaboratory, will outline the benefits of an Information Sharing and Analysis Organization (ISAO), explain how you can benefit from joining an ISAO even if you're already part of an ISAC, and provide an example of how collaboration around cyber threat data can enable your organization to efficiently identify and neutralize the most prolific and potentially harmful threats out there.
  • SOC as a Service – What you must know? Recorded: Aug 21 2019 47 mins
    Senthil Palaniappan, CEO & Founder at Sennovate Inc. | Kumar K, Lead Solution Architect at Sennovate Inc.
    Running SoC on-premise is highly complex and expensive. This calls for expertise (for example -Firewall, DNS, Network analyst, Active Directory Domain, IAM), and well preparedness to handle unique situations. This is key in protecting any organization's digital assets. It becomes imperative for starter companies to build the credibility success factor to stay competitive as against large enterprises. This raises the question of how you would leverage various security products, to build a true Security Operations Center (SoC) yet delivered as a Service.

    Register for this webinar and you will learn about:
    > SoC as a Service, and its Importance
    > Key Components of SoC - Asset Discovery, Threat detection, Vulnerability Assessment, Behavioral Monitoring
    > Rapid Incident Response & Event Investigation
    > Better Risk & Compliance Management
    > Role of AI/ML to simplify the process
    > Choosing SoC as a Service vs Build your own SoC
    > Things to consider while choosing SoC as a Service provider

    About the speakers:

    Senthil Palaniappan, CEO & Founder at Sennovate Inc.
    - Over 25 Years of Industry Experience in Information technology
    - Specializes in Information Security, Identity and Access Management, Infrastructure and Integration
    - Consulted with various fortune companies

    Kumar K, Lead Solution Architect at Sennovate Inc.
    - Over 18 years of industry experience
    - Specializes in various Identity and Access Management products including oracle and various cloud products
    - Vast experience in building custom solutions with Oracle Access Manager.
  • Threat Hunter: Implications of an Active Cyber Defense Recorded: Aug 21 2019 61 mins
    Griff James (Damrod Analysis) | Wyatt Hoffman (CEIP) | Will Lymer (Loki Labs) | Philip Thomas (Reed Smith)
    It is beyond the ability or willingness of the world’s governments to protect and secure information technology. What role then can the private sector play in making cyberspace safer? Can private enterprises do anything to strike back at attackers, curtailing their freedom of action and raising the costs of malicious activity?

    Consisting of academics and industry experts, this panel will explore the potential for active cyber defence to impede and deter malicious activity and the conditions under which it could be conducted responsibly.

    - Griff James, Director at Damrod Analysis
    - Wyatt Hoffman, Research Analyst, Cyber Policy Initiative at Carnegie Endowment for International Peace
    - Will Lymer, Chief Growth Officer at Loki Labs
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Solving the Other Two Thirds of your Identity Challenge
  • Live at: Dec 2 2008 6:00 pm
  • Presented by: Robert Grapes, Chief Technologist, Datacenter Solutions, Cloakware, Inc.
  • From:
Your email has been sent.
or close