How Identity and Access Intelligence (IAI) Can Help With Your Next Audit

Alan Norquist, Chief Executive Officer, Veriphyr
Are access control audits time consuming and tedious? Are auditors finding excessive access rights and other compliance issues? Learn about a new approach Gartner calls "Identity and Access Intelligence" (IAI).

Join Alan Norquist, CEO of Veriphy, as he introduces IAI and demonstrates how this approach improves the outcome of access control audits, as well as reduces the time and effort needed for audit preparation.

Topics covered will include:

- What Identity and Access Intelligence (IAI) is and what problems it solves.
- How IAI relates to Identity and Access Management (IAM/IdAM).
- How IAI can be used to enable fast accurate compliance of user access activity as well as roles and rights.
- How IAI big data analytics can census all user rights and activity in less time than needed to manually test a sample.
Aug 15 2012
40 mins
How Identity and Access Intelligence (IAI) Can Help With Your Next Audit
Join us for this summit:
  • Channel
  • Channel profile
  • Cloud Security Report 2015: What You Need to Know Jun 9 2015 5:00 pm UTC 45 mins
    Martin Lee, Manager, Intelligence, Alert Logic
    With the recently released Cloud Security Report, Alert Logic will open the doors to our research team and give you insight into how we gather data to prepare the cloud security report.

    Register for this live webinar as Alert Logic ActiveIntelligence team manager Martin Lee provides insight into the key resources used by our staff to find the latest data and then explore what our research team does with the information.

    This webinar will also cover:

    •Macro-trends uncovered in this years report,
    •The cyber kill chain in easy to understand terms
    •Industry specific analysis
  • HP Cyber Risk Report 2015: The Past is Prologue Jun 9 2015 4:00 pm UTC 30 mins
    Jewel Timpe, Senior Manager- Threat Research, HP Security Research
    In the world of information security, the past isn’t dead; it isn’t even the past.

    The 2015 edition of HP’s annual security-research analysis reveals a threat landscape still populated by old problems and known issues, even as the pace of new developments quickens. In 2014, well-known attacks and misconfigurations existed side-by-side with mobile and connected devices (the “Internet of Things”) that remained largely unsecured. As the global economy continues its recovery, enterprises continued to find inexpensive access to capital; unfortunately, network attackers did as well, some of whom launched remarkably determined and formidable attacks over the course of the year.

    The 2015 edition of the HP Cyber Risk Report, drawn from innovative work by HP Security Research (HPSR), examines the nature of currently active vulnerabilities, how adversaries take advantage of them, and how defenders can prepare for what lies ahead. Jewel Timpe, HPSR’s senior manager of threat research, describes the report’s findings and explains how this intelligence can be used to better allocate security funds and personnel resources for enterprises looking toward tomorrow.
  • Anatomy of a Botnet – Dissecting and Malware analysis Jun 9 2015 12:00 pm UTC 45 mins
    Tiago Pereira, Threat Intel Researcher at AnubisNetworks
    Knowing that your company has been compromised is just the first step in a long road to erase the threat.

    Many companies take weeks and sometimes months to address compromised machines due to a lack of real-time notifications or, in many cases, a deep understanding of the malware profile.

    Tiago Pereira, Threat Intel at AnubisNetworks will share the methodology used by AnubisNetworks which comprises the combination of Cyberfeed threat intelligence capabilities with the expertise of the security team to dissect and understand the botnet behaviour, destroying capabilities and threat risk for organizations. The first part of the webinar will be dedicated to explaining the methodology and the second how it was applied in a real case study.

    In this webinar you will learn:
    - AnubisNetworks’ sinkhole techniques and botnet research methodology
    - Case study: understand a botnet:

    o DGA mechanisms

    o Decipher the network protocol

    o Uncover the malware capabilities
  • The Evolving Cyber Threat Landscape Jun 9 2015 11:00 am UTC 45 mins
    Adrian Nish, Head of Cyber Threat Intelligence, BAE
    Attackers are getting smarter, while repurposing what we thought were outdated techniques. So, how can your organisation stay safe?

    In the past decade we’ve seen the emergence of the world’s youngest profession – the Cyber-Intruders. These actors, often working normal 9 to 5 hours, Monday to Friday, are paid to break into systems and steal sensitive information or scope out a target for their employer.

    Crime-as-a-service has become a reality in cyber-space, with specialisms emerging which make it akin to a mini-industrial revolution. The techniques they use are often novel, though not always. Out-dated technology as well as lessons unlearned by organisations mean that persistent attackers can breach networks with relative ease.

    This talk aims to present the current state of the cyber threat landscape, what are the latest tricks attackers are using, and what should organisations focus on to keep data and systems secure.
  • Five steps to improving security: A pragmatic approach Jun 9 2015 11:00 am UTC 45 mins
    Hadi Hosn, Managing Principal Consultant, Dell SecureWorks
    Information security is becoming more and more vital to organisations in an ever changing landscape with the role of the Chief Information Security Officer (CISO) growing in magnitude with hacker based activity, cloud computing, and work-from-anywhere initiative adding to the complexity. New privacy regulations, social media and BYOD have added further challenges and put additional strains on compliance…

    In this webcast, Hadi Hosn, Managing Principal Consultant at Dell SecureWorks, will discuss the five key areas we believe a CISO should focus today to help shape and drive a security programme. Hadi will focus on the most important areas that are applicable in all market sectors and centre in on those activities that, in his experience, deliver the most value, security improvement and return on investment.

    Key topics covered include:

    •Understanding your organisation’s extended enterprise

    •How to improve visibility into what’s going on in your environment

    •Building a culture of security in your organisation
  • If Hacking is the Poison, What's the Antidote? Jun 9 2015 10:00 am UTC 45 mins
    James Hanlon CISM, CISSP, Cyber Security Strategy & GTM Lead, EMEA
    James Hanlon, Security Strategist at Symantec, looks at both the current cyber poisons and potential antidotes to the the cyber security challenge. The discussion will focus current threat landscape and the changes we are seeing in regard to hacking and cyber attacks. It will pose the questions to whether global intelligence & data analytics is an approach that can be used counter the most advanced threats.
  • Stopping Data Breaches: Show me the money Jun 3 2015 3:00 pm UTC 45 mins
    Dave Finger, Director of Product Marketing, Fortinet
    Yes, there are annual studies that calculate the cost of the average data breach. And yes, within weeks of a major data breach the headlines shift from number of records lost to estimated cost. So it is unsurprising, if troubling, that a recent survey of enterprise executives indicated that the #1 thing they are most concerned about protecting from cyber attack is customer data. However, there are other important aspects to making a business case for improving your security posture. This webcast will discuss what we feel you should be concerned about losing and why…and it’s not just customer records that require costly breach notification.
  • Using Your Network and Cisco ASR 9000 for Comprehensive DDoS Protection Jun 3 2015 2:00 pm UTC 45 mins
    Talbot Hack, Senior Product Manager, Arbor Networks + Mike Geller Principal Engineer Cisco Systems
    DDoS attacks are rising in size, frequency and complexity; recent research from Arbor Networks discovered a 334 Gbps DDoS attack! What makes this concerning is that there isn’t a single DDoS protection product on the planet that can stop attack of this magnitude. So what’s the solution? You need to leverage your network to stop DDoS attacks.

    In this session, representatives from two industry leaders – Talbot Hack from Arbor Networks and Mike Geller from Cisco Systems- discuss best practices in leveraging your network for DDoS detection and mitigation.

    This presentation will cover:
    -The use of current and emerging technologies such as, Netflow, BGP, Flowspec, S&D/RTBH and SDN/NFV
    -An introduction to a joint Arbor-Cisco solution which embeds Arbor’s Threat Management System (TMS) technology in the Cisco’s ASR 9000 router for network embedded, virtual DDoS protection
  • Experiments in Deep Learning May 28 2015 6:00 pm UTC 60 mins
    Patrick Hall, Senior Associate Research Statistician Developer, SAS
    The human brain makes it look easy. What our eyes see, we decode immediately and effortlessly. But is it that simple? In truth, how we process images is staggeringly complex. Inspired in part by our remarkable neurons, deep learning is a fast-growing area in machine learning research that shows promising breakthroughs in speech, text and image recognition. It’s based on endowing a neural network with many hidden layers, enabling a computer to learn tasks, organize information and find patterns on its own.

    Recently, SAS took on a classical problem in machine learning research, the MNIST database, a data set containing thousands of handwritten digit images. Learn how we did – and what it reveals about the future of deep learning.
  • Cyber Insurance Underwriting - A High-Tech Discipline? May 28 2015 4:00 pm UTC 45 mins
    Ira Scharf, GM of Insurance, BitSight and Advisen Insurance Intelligence
    The cyber market is an ever-changing industry. So how are insurance carriers currently assessing the risks their insured face? And how are they mitigating those risks?

    In this webinar, Ira Scharf, our GM of Insurance, teams up with Advisen Insurance Intelligence to discuss how cyber exposures have grown and changed over the last 20 years, and how the insurance product has evolved to keep pace.

    Watch this on-demand webinar to:

    learn exactly how the underwriting process has developed over the years,
    hear experts discuss the current trends in the industry, and
    find out the latest tools carriers are adopting to better assess corporation’s cyber preparedness.
  • Creating a Government Private Threat Intelligence Cloud May 27 2015 6:00 pm UTC 75 mins
    Taylor Ettema, Product Manager, Threat Prevention Technologies
    With the sophistication and highly targeted nature of attacks against governments, the adversary can use numerous approaches and actions to get in and move across the network. Palo Alto Networks Threat Intelligence—from the cloud or an on-premises government-run platform—constantly gathers intelligence on evasive applications and converts the intelligence back into all platform devices. This ensures that organizations maintain control of evasive applications to ensure authorized activity traverses the networks while unauthorized activity fails to route.

    Join this webinar to Learn:
    - How Government Agencies can develop and manage their own threat intelligence cloud on a closed, dedicated Palo Alto Networks WF-500 threat intelligence platform.

    - How to create effective threat intelligence private clouds for a singular agency or for a group of Agencies, Ministries or Departments who wish to share their threat intelligence.

    - How the threat intelligence cloud (public or private) analyzes and correlates intelligence from all platform security functions—URL Filtering, mobile security, IPS/threat prevention and the virtual execution engine or sandbox, WildFire™— and validated community input.

    - How WildFire immediately discovers previously unknown malware and communicates the results to the platform to automatically generate signatures.

    - How all threat intelligence is distributed to the network and endpoints to ensure they are protected.

    - How this is all done automatically, reducing operational burden and shortening an organization’s response time.

    - How this innovative architecture can be operated at a fraction of the cost it takes to deploy and manage an equivalent set of point products – APT, IDS/IPS, URL filtering and more – all correlating insights automatically in real-time for greatest network protection.
  • How to Assess and Manage Your Cyber Risk May 27 2015 5:00 pm UTC 60 mins
    Stephen Cobb, Senior Security Researcher, ESET
    Information technology brings many benefits to a business, but it also brings risks. Knowing how to assess and manage those cyber risks is essential for success, a powerful hedge against many of the threats that your business faces, whether you are an established firm or pioneering startup. ESET security researcher Stephen Cobb explains how cyber risk assessment and management can work for you.
  • How Bad Can Zero Days Get? May 27 2015 5:00 pm UTC 45 mins
    Robert Hansen, VP of WhiteHat Security Labs
    Are you giving the adversary unintended access through vulnerabilities in your system?

    By only having one method of finding vulnerabilities or one way of mitigating them, the chances of the adversary getting through are increasingly high. This webinar will walk you through the current threat landscape, how vulnerabilities can be found, and how to mitigate control.

    In this webinar you'll learn:

    - What types of assessments work at which points in the software development lifecycle.
    - What is the most popular way to deploy a WAF and why that's not a good idea as a single method of defense.
    - Why finding and fixing your vulnerability isn't actually good enough.
  • When Do Managed Security Services Make Sense? May 27 2015 5:00 pm UTC 45 mins
    Guest Speaker: Ed Ferrara, Principal Analyst, Forrester Research, Mark Stevens, VP Global Services, Digital Guardian
    The importance of protecting sensitive data is gaining visibility at the C-level and the Boardroom. It’s a difficult task, made even more so by the shortage of security experts. One option that more and more companies are pursuing is the use of managed security services. This can enable them to employ sophisticated technologies and processes to detect security incidents in a cost-effective manner. Should managed security be a component of your security mix?

    In this webinar, Ed Ferrara of Forrester and Mark Stevens of Digital Guardian will discuss:

     When does it make sense to utilize managed security services

     How to the scope the services your company contracts out

     Questions to ask when evaluating managed security services providers

     The key criteria for selecting managed security providers
  • All About the Base: Test Drive FortiGate-VMX from Hypervisor and up May 27 2015 4:00 pm UTC 45 mins
    Cynthia Hsieh, Director of Product Marketing, Cloud and SDN product, Fortinet.
    Server virtualization is a mature technology. More than 70% of all x86 architecture workloads are running in VMs on top of hypervisors. With the increase in virtualization of mission critical workloads plus clustering and high availability, it’s more challenging than ever to get the visibility and dynamic rule settings for North-South and East-West traffic. In this session, no future hype, learn what is happened today with FortiGate-VMX use cases to secure all of your hypervisors and provide a real-world agility traffic testing using Ixia Breakingpoint for the proof.
  • SIEM Roadmap 2015 May 27 2015 3:00 pm UTC 30 mins
    Tom Clare, Director, Arctic Wolf
    Security event management continues to evolve as data breaches put more pressure on detective defenses providing continuous monitoring. Many companies have invested strongly in preventive defenses to stop attacks before they infect. Now the game changes to detecting the unknown and this requires scale and performance of SIEM solutions with increasing context for depth and visibility in the hands of security experts with an analytics mindset. Not everyone can play on this field, learn your options.

    Attendees will learn:
    - SIEM architecture changes for visibility
    - Increasing complexity of data analytics to explore
    - SIEM taxonomy and trade-offs between generations
    - Analyst recommendations & best practices
    - Why resources are key to SIEM success
  • View from the CISO Chair May 27 2015 2:15 pm UTC 60 mins
    Tom Bowers, Principal vCISO Services Practice at ePlus
    View from the CISO Chair - Security as Business Risk with Tom Bowers, Principle Security Strategist, ePlus
  • Addressing Challenges in Securing the Software Defined Data Center May 27 2015 8:00 am UTC 60 mins
    Claudio Salmin, Fortinet Consulting Systems Engineer
    Data center security is being reshaped by virtualisation, consolidation, and promising new technologies such as Software Defined Networking (SDN).
    The adoption of the SDDC brings new challenges such as inspecting East-West traffic without the need to compromise on all the benefits of today's physical appliances.
  • DDoS Attacks Are a Serious Threat to U.S. Companies, Not for Reasons You'd Think May 26 2015 5:00 pm UTC 45 mins
    Margee Adams, Director of Product Marketing, Neustar
    Neustar, in its annual DDoS Attacks Report shares critical DDoS trending data from real companies from across industries. Learn how companies are ramping up DDoS protection tactics and why.
  • POS Attacks Persist: Fight Back with 5 Key Defense Strategies May 26 2015 5:00 pm UTC 60 mins
    Ken Dang, Product Marketing Manager, Dell Security
    2014 was a year pack with hacker attacks on payment card infrastructures but we’re not out of the woods yet. Dell’s threat research team have regularly observed new active pieces of advanced Point-of-Sales (POS) malware in 2015. Why so many retailers still soft targets? For cyber criminals, retail is where the money is. The possibility of spiriting away and selling thousands or millions of credit card details and chunks of consumer information is powerful incentive.
For Certified Members and Information Security Professionals Globally
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI) and EC-Council Certified Security Analyst (E|CSA)/License Penetration Tester (L|PT) programs, and various others offered in over 60 countries around the globe.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How Identity and Access Intelligence (IAI) Can Help With Your Next Audit
  • Live at: Aug 15 2012 6:00 pm
  • Presented by: Alan Norquist, Chief Executive Officer, Veriphyr
  • From:
Your email has been sent.
or close
You must be logged in to email this