Single Sign-On to Go! How IAM Can Support BYOD

Manage webcast
Eric Olden, Executive Chairman and Founder, Symplified
In addition to managing cloud-apps and user accounts scattered across a network, IT staff must implement a solution to manage personal mobile devices. It needs to be flexible enough to include new devices that want to join the network yet capable of securing any mobile platform and operating system. IT must strike a balance between the need to access the corporate network and the need to protect and manage access to valuable intellectual property. This webcast will explore Identity Management and how it supports mobile devices in an increasingly BYOD world.
Sep 6 2012
44 mins
Single Sign-On to Go! How IAM Can Support BYOD
Join us for this summit:
  • Channel
  • Channel profile
  • Security 2020 Jul 31 2015 5:15 pm UTC 60 mins
    Tom Bowers, vCISO for ePlus
    Tom Bowers, vCISO for ePlus and their clients, will cover what he sees as the looming threats for 2016, including Threat Intelligence and Sharing, State Sponsored Code and Commercial Malware, Security of Big Data, Embedded Systems, and the Physical and Cyber Convergence.
  • How the United States Postal Service secured their email channel against fraud Jul 30 2015 6:00 pm UTC 30 mins
    Michael Ray, Inspector in Change of Revenue, Product & Cyber Security at the United States Postal Inspection Service
    Email is #1 source of risk in today's enterprise, yet also the #1 digital communication channel for businesses today. The United States Postal Service sends more than thirteen million emails per day, which makes their email channel and brand a high-profile target for criminal email cyberattacks. In this case study webinar, hear from Michael Ray, Inspector in Change of Revenue, Product & Cyber Security at the United States Postal Inspection Service, as he shares their story of how they implemented Agari to protect their brand and their customers against fraudulent attacks by securing their email channel.
  • Hunting Hackers in the Carding Underground Jul 30 2015 5:00 pm UTC 45 mins
    Grayson Lenik, Director of Digital Forensics and Incident Response at Nuix
    The rise in e-commerce data breaches over the past year raises important questions: Why is cardholder data such a big target, how do the bad guys get in and why are we seemingly powerless to stop them?

    This session will examine the black market for card data, the three most common attack vectors, and the wrong way to encrypt databases.

    You will see real-world examples of malware discovered during investigations and gain insights into the skill sets of each attacker.
  • Contextual Analytics: A Deep Dive into the Contextualization of Threat Data Jul 30 2015 4:00 pm UTC 45 mins
    David Dufour, Senior Director of Security Architecture, Webroot
    This presentation will provide an overview of contextualization and how contextualized data can be used to prevent both known and unknown threats. It will dive deep into the technologies used in the collation and analysis process across both single and multiple threat types. It will conclude with real world use cases where contextualized data can help identified and prevent threats.
  • Internet Security Best Practices From The Global 1000 Jul 30 2015 4:00 pm UTC 60 mins
    Daniel Druker, Chief Marketing Officer at Zscaler
    The world of IT security is undergoing tremendous change. The unstoppable momentum of the Internet and cloud computing, the ubiquity of mobile devices and the emergence of Internet of things have together turned the IT security landscape upside down.

    So what can you do today to keep your security ahead of these trends?

    This webcast will discuss actionable best practices gleaned from more than 5,000 leading global organizations - including United Airlines, Humana, Sealed Air, British American Tobacco, the United States Marines and NATO.

    We will also talk about:

    - The latest strategies and techniques cyber-criminals are using today
    - Concrete steps you can take to keep your organization safe
    - What to do about Internet security in today's cloud and mobile first IT landscape
  • Surviving the incident response surge: Detecting and Investigating Incidents Jul 29 2015 6:00 pm UTC 60 mins
    Christian Kirsch, Principal Product Marketing Manager, Rapid7
    As security incidents grow in frequency and complexity businesses struggle to be prepared to respond and mitigate the threat. Incident detection and response is expected to take up the majority of security budgets by 2020 but solutions are siloed and specialized staff is hard to hire and retain. How can security professionals who may not be experts in incident response detect and assess the scope of potential incidents or breaches effectively? This case study will explore this question leveraging real-world examples that illustrate how to confidently detect and respond to security incidents 10x faster.

    Participants will learn:
    · Methods for simplified discovery of anomalous user behavior

    · Strategies for enabling fast incident response decisions

    · How to cope when bombarded with false positive alerts

    · Common attacker methods (and why they’re so often successful)

    · Why you need to monitor privileged and risky accounts
  • Constrained or Unleashed:Is your Identity Mgt Ready for Consumer-scale Business? Jul 29 2015 5:00 pm UTC 60 mins
    John Hawley, Vice President of Security Strategy at CA Technologies
    Consumer-Scale Identity Management Deployments require different approaches than the typical employee use case. However, there are profound benefits - from overall risk reduction to enhanced engagement and loyalty with customers. This webcast will highlight the key challenges in moving identity management from the IT user to a much larger business user population and highlight best practices for success.

    As a two part series, this webcast will be followed by "Improving Your User Experience for Successful Consumer-Scale Identity Management", scheduled on August 19th.
  • Sophisticated Incident Response Requires Sophisticated Activity Monitoring Jul 29 2015 4:00 pm UTC 60 mins
    Mike Sanders, Principal SE and Team Lead, Imperva and Bryan Orme, Principal, GuidePoint Security
    Are you prepared for a data breach? Are you confident you will find a breach in a timely manner? Facts are over 70% of businesses report a security breach and 75% of breaches are undetected for days or even months. Once discovered, incident response teams are under extreme pressure to close the breach, figure out what happened, what was lost, and calculate the risk. Organizations need a sophisticated incident response plan.

    Attend this webinar and learn how to:
    · Discover sensitive data, risk, and vulnerabilities
    · Detect and block active attacks
    · Investigate incidents and automate remediation
    · Demonstrate consistent policy application across all sensitive data
  • Data Security in 2015: Is it getting better? Jul 29 2015 3:00 pm UTC 45 mins
    Graham Cluley
    Join data security expert Graham Cluley as he presents a mid-year review of the information security stories that have made news so far in 2015, and how the predictions he made in our January webinar have fared.

    With over 300,000 new pieces of malware created every day, company data has never been at greater risk. Hear from Graham about the vulnerabilities and risks that remain, and what organizations can do to address them.

    All webinar registrants will receive a copy of Graham’s report “Information Security in 2015: Just how much worse can things get?” on 2015 threats and keeping your data safe.
  • Uncovering Security Performance Myths & Realities Jul 28 2015 6:00 pm UTC 60 mins
    Tom Turner, EVP, BitSight
    Organizations have long struggled to find objective ways to measure and compare performance, leaving many executives to trust metrics and data points that may not be painting the clearest picture of security posture.

    To highlight this issue, BitSight recently surveyed over 300 IT executives in 4 major industries to assess their confidence in their security performance. We then compared responses to our own security ratings data, which measures effectiveness across key performance areas including security events, configurations, and user behaviors.

    In this webinar, BitSight EVP of Sales & Marketing Tom Turner takes a deeper look into these fidings and discusses the business implications of optimism bias.

    Download this webinar to learn:

    How security performance varies among Finance, Healthcare, Retail, and Energy/Utilities
    Whether optimism bias exists in these industries and how it may be affecting overall security performance
    Why continuous performance monitoring should be a critical component of enterprise risk management and how leading organizations are using BitSight Security Ratings to manage their cyber risk
  • Detect Ransomware Before Its Too Late with AlienVault USM Jul 28 2015 5:00 pm UTC 45 mins
    Mark Allen, Technical Sales Engineer
    By now you've probably heard about new ransomware threats like CryptoWall, which encrypts your data and demands payment to unlock it. These threats are delivered via malicious email attachments or websites, and once they execute and connect to an external command and control server, they start to encrypt files throughout your network. Therefore, spotting infections quickly can limit the damage.

    AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the hackers’ command and control server. How does it all work? Join us for a live demo that will show how AlienVault USM detects these threats quickly, saving you valuable clean up time by limiting the damage from the attack.
    You'll learn:
    How AlienVault USM detects communications with the command and control server
    How the behavior is correlated with other signs of trouble to alert you of the threat
    Immediate steps you need to take to stop the threat and limit the damage
  • The Cybersecurity Landscape Jul 28 2015 5:00 pm UTC 15 mins
    Lawrence Orans, Research Vice President, Gartner
    Cybersecurity is a top concern for IT professionals. Gartner expert Lawrence Orans leads an important discussion of the current cybersecurity landscape. He analyzes recent cybersecurity events, emerging threats, and how new technologies are affecting the security calculus.
  • Lessons Learned From the Biggest Security Breaches Jul 28 2015 4:00 pm UTC 60 mins
    Michael Sutton, VP of Security Research at Zscaler,John Kindervag, VP and Principal Analyst at Forrester Research
    The risk of experiencing a security breach is now higher than ever. Over the last 12 months, some of the highest profile companies have been compromised including Anthem, Sony, Home Depot, JPMorgan Chase, Target and more.

    2015 is turning out to be no different. Clearly no organization is immune to a breach and human error continues to play a primary role.

    This webcast will address:
    - Key trends and traits common to high profile security breaches
    - Critical takeaways and lessons learned for a comprehensive security strategy
    - Best practices to reduce the risk of a security breach
  • Insider threats - How to fight vulnerability from within the company Jul 28 2015 3:00 pm UTC 45 mins
    Niels von der Hude , Director of Market Development, Beta Systems Software
    Recent studies have shown that 50-70% of all attacks on information security are coming from within the organization, and often the length of time that the breach existed is unknown. There are many issues involved in closing the gaps that cause such insider incidents and strengthen the protection of data. Using the "need to know" principal, organizations can limit who has access to data. Controls that adjust given access rights to actual needs exist and should be utilized. This session will focus on how to adjust data access rights, implementing the "least privilege principal", and the use of detective and proactive risk-oriented controls.
  • Don't get hooked: How to protect against SpearPhishing Jul 28 2015 2:00 pm UTC 45 mins
    Michelle Couture, Product Marketing Manager, hosted Exchange
    Fully secure your network by learning how to protect against cybersecurity’s weakest link: humans. 95% of all attacks on networks were the result of “spear phishing”: attempts to steal data by masquerading as a trustworthy entity. They send an email from the “CEO” or “building manager" but once you click… it’s GAME OVER!
    We will cover:
    •How a phishing attack happens
    •Stories from real life attacks and the lessons learned from them
    •Steps you can take to protect your company
  • Transforming email security: Building a strategic plan for CISOs Recorded: Jul 23 2015 58 mins
    Jim Routh, CISO, Aetna and Chris McClean, VP of Research, Forrester
    The role of the CISO is evolving - and fast. CISOs today must find innovative ways to align with the business and strategize security as a top business asset -- and those that ascend in their role will have the opportunity to play a bigger, more influential role in the years to come. In this webinar hosted by Agari, you will hear Jim Routh, Aetna CISO share real world insights into specific challenges and solutions to approach today's evolving email threats as well as key 2018 CISO research from Chris McClean, Forrester VP of Research.
  • System Dynamics of the 0day Market Recorded: Jul 23 2015 31 mins
    Katie Moussouris, Chief Policy Officer, HackerOne
    When a popular product is launched, a high-stakes race begins between the offense and defense markets to find software vulnerabilities. More and more organizations are seeing that incenting security research with programs like bug bounties are an effective way to find vulnerabilities. Katie Moussouris, Chief Policy Officer of HackerOne, will reveal what the latest research shows and what it means for companies today.

    About the presenter:

    Katie Moussouris is the Chief Policy Officer for HackerOne, a platform provider for coordinated vulnerability response & structured bounty programs. She is a noted authority on vuln disclosure & advises lawmakers, customers, & researchers to legitimize & promote security research & help make the internet safer for everyone. Katie's earlier Microsoft work encompassed industry leading initiatives such as Microsoft's bounty programs & Microsoft Vulnerability Research. She is also a subject matter expert for the US National Body of the International Standards Organization (ISO) in vuln disclosure (29147), vuln handling processes (30111), and secure development (27034). Katie is a visiting scholar with MIT Sloan School, doing research on the vulnerability economy and exploit market. She is a New America Foundation Fellow. Katie is an ex-hacker, ex-Linux developer, and persistent disruptor. Follow her and HackerOne on Twitter http://twitter.com/k8em0 and http://twitter.com/hacker0x01
  • Stopping Zero-day Threats Recorded: Jul 23 2015 56 mins
    Dan Maier, Senior Director of Product Marketing, Zscaler Inc.
    If Anthem, Sony, Home Depot, Target and Neiman Marcus can fall victim to security breaches, so can you. The bad news is - no company is immune, no matter how big or small you are. Without a proper understanding of zero-day threats, companies have no way of exposing the gaps of overhyped security solutions. These threats are very sophisticated and often leveraging previously unknown attack techniques and vulnerabilities.

    Join us for a compelling webcast that will highlight critical insights combating zero-day threats - including the ability to:

    • Track employee traffic at all times, in real time, irrespective of whether they are inside or outside the corporate network
    • Derive intelligent insights and meaningful data for fast corrective action
    • Avoid a strategy based on "alerting" you about infections - without any guarantees you will notice them
    • Implement a comprehensive approach to stopping zero-day threats - based on protection, (inspecting every byte of traffic and automatically blocking threats), detection and remediation
  • 2015 Stats Report Explained, Where Flow Charts Don't Go Recorded: Jul 22 2015 42 mins
    Jeremiah Grossman, Founder WhiteHat Security
    In this insightful and data-rich webinar Jeremiah Grossman, founder of WhiteHat Security, presents findings from WhiteHat's 2015 Website Security Statistics Report.

    The report, generated by examining vulns in more than 30,000 websites under WhiteHat’s Sentinel management, provides unique perspectives on the state of website security. Data by industry will be presented and accompanied by expert analysis and recommendations.

    Why Attend:

    -Discover the most prevalent vulnerabilities

    -Learn how many vulnerabilities are typically remediated and the average time to resolve

    -Hear why the best approach is to identify specific security metrics to improve upon

    -Take away valuable recommendations for measurable improvement within your application security programs
  • The Hacking Team Hack: Lessons Learned for Enterprise Security Recorded: Jul 22 2015 57 mins
    Stephen Cobb, Sr. Security Researcher
    Your company can learn valuable lessons about risk strategy and incident response from what happened to Hacking Team, a firm that supplies surveillance tools to government agencies. Widely accused of helping governments spy on dissidents and journalists, Hacking Team found itself hacked with embarrassing, possibly damaging results. ESET senior security researcher Stephen Cobb explains the missteps made and the lessons to be learned during this webinar.

    Key takeaways:
    •How Hacking Team’s mistakes mirrored those made by Sony
    •How employees’ weak passwords helped facilitate the breach
    •How transparency would have helped Hacking Team’s credibility
    •Why every company must review what might be exposed in a breach
For Certified Members and Information Security Professionals Globally
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI) and EC-Council Certified Security Analyst (E|CSA)/License Penetration Tester (L|PT) programs, and various others offered in over 60 countries around the globe.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Single Sign-On to Go! How IAM Can Support BYOD
  • Live at: Sep 6 2012 7:00 pm
  • Presented by: Eric Olden, Executive Chairman and Founder, Symplified
  • From:
Your email has been sent.
or close
You must be logged in to email this