Hi [[ session.user.profile.firstName ]]

Are You Getting the Most Out of Your IAM System? Four Ways to Find Out

Identity and access management (IAM) initiatives with a focus on users can enable your business, while still supporting their traditional role in the important areas of security, compliance, and reliability.

In the research report "IAM for Everyone: How A Broader Strategic Focus on Users Pays Off," Aberdeen Group’s Derek Brink describes four high-level attributes that can help you quickly assess whether your organization’s IAM initiatives are on a path to achieve similar results:

- IAM is viewed not only as the technical means for control, compliance, and cost efficiencies, but also as an essential strategic business enabler
- Both rewarded risks (eg. enablement) and unrewarded risks (eg, protection) are among the top drivers of your IAM investment
- There is a strong focus on a convenient, streamlined, and personalized user experience
- The performance of your IAM investments are being measured and are helping to produce the desired business value

Join CA Technologies and Aberdeen Group for this highly informative on-demand webinar on IAM as a strategic enabler.
Recorded Jan 27 2016 57 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Derek Brink, VP and IT Research Fellow at Aberdeen Group & Sumner Blount, Director, Security Solutions at CA Technologies
Presentation preview: Are You Getting the Most Out of Your IAM System? Four Ways to Find Out

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Threat Intelligence – Hype or Hope? Mar 8 2018 6:00 pm UTC 60 mins
    Mark McGovern, Vice President, Product Management, CA Technologies
    As threats and attacks become more frequent, the alerts and alarms to be investigated become more unmanageable. Plus, by the time the warnings are checked, the damage may already be done. We need a new paradigm that moves the enterprise from reactive to predictive. Can user behavior analytics and machine learning deliver the threat intelligence that is needed, and if so, how do we start to use it?

    Join Mark McGovern, Vice President, Product Management, CA Technologies as he takes a closer look at threat intelligence and its unique capabilities. The session will uncover the:

    • Challenges and benefits of collecting the data needed to detect threats
    • Immediate value and risks posed by a shared threat intelligence model
    • Advantages of applying advanced machine learning to specific problems

    Whether you are new to cybersecurity or an experienced professional, threat intelligence should be on your “need to know” security agenda.
  • GDPR & Privileged Access Management … Are You Ready? Mar 1 2018 6:00 pm UTC 60 mins
    Cullen Lemley, Cybersecurity Consultant at CA Technologies
    May, 25 2018. It’s a date that is approaching quickly. It’s also the deadline for GDPR compliance. For companies that fail to comply, the cost can be high - as much as 4% of annual turnover.

    Note: There is a misconception is that the regulation affects only companies in the European Union. In fact, it applies to any company that has dealings or plans to have dealings with citizens that reside in the EU.

    Take the lead and get ready to initiate GDPR. Join Cullen Lemley, Cybersecurity Consultant at CA Technologies, for an overview of the impending regulations. Learn the important security facets of GDPR, the challenges for Privileged Access Management, and how businesses around the globe are preparing for the deadline.
  • Next-Gen Directory Services: How CIAM and IoT Drive Security & Performance Feb 15 2018 6:00 pm UTC 60 mins
    CA Technologies: Clayton Donley, SVP Software Engineering, Security & Rob Lindberg, Sr Principal Product Mngr, CA Directory
    The reality is that Consumer Identity and Access Management and the Internet of Things are fostering unprecedented change. The scale and types of devices and digital identities are increasing at a significant pace, driving huge security and performance concerns. These concerns have many companies asking:

    • How are potential risks being monitored and secured?
    • How are users and devices being managed?
    • How are directory services being configured?

    Learn to address these challenges, while shaping a more secure and cost-effective infrastructure.

    Join CA Technologies gurus Clayton Donley, SVP, Software Engineering, Security and Rob Lindberg, Sr Principal Product Manager, CA Directory to explore alternatives and recommendations. You'll also be able to compare performance results of leading next-gen directory services, tested and compiled by an independent, third-party.
  • Advanced Access Management for the Modern Enterprise Feb 8 2018 6:00 pm UTC 60 mins
    Carol Alexander, Senior Director, Security Products , CA Technologies
    It’s a dilemma. Today, security must be built into mobile applications to fight rampant online fraud, but many App Developers don't have the necessary skill set … nor the time required to become proficient coders. What is the answer?

    Join Carol Alexander, Senior Director, Security Products at CA Technologies, to learn how to quickly build and maintain modern, frictionless, and secure apps for your customers. It’s true. With CA Rapid App Security, developers can easily and rapidly:
    • Integrate device security and multifactor and risk-based authentication into apps
    • Eliminate dozens of complex steps, typically required for coding user and device security

    Let your developers focus on mobile applications requirements, while your business delivers a trusted user experience.
  • Show Me the Mandates! How to Interpret PSD2 RTS SCA / GDPR / 3DS 2.0 Jan 25 2018 4:00 pm UTC 60 mins
    CA Technologies Payment Security gurus, Product Management Advisor Jayakuma & Presales Director Matt Berryman
    Recently, there have been several payment industry initiatives designed to make electronic payments safer. Consequently, financial entities like merchants, PSPs, and consumers will soon face many changes. Although the initiatives’ premise − to eliminate vulnerabilities in the payments cycle − is welcome; businesses must now prepare to comply. Are you ready?

    Join our CA Technologies Payment Security gurus, Product Management Advisor Jayakumar Krishnasamy and Presales Director Matt Berryman to find out:
    • How to interpret the recent payment initiatives
    • If risk-based authentication satisfies mandates
    • Which strong authentication methods are compliant
  • From Where You Are to Where You Want to be with 3DS 2.0 Recorded: Jan 18 2018 23 mins
    Hannah Preston, Solution Strategist, Payment Security, CA Technologies
    3-D Secure 2.0’s impact on the financial industry will be one of the most significant in recent years. Built around the increasing popularity of mobile commerce, 3-D Secure 2.0 is predicated on risk-based authentication, leveraging data points for accurate verification, while optimizing the consumer experience.

    But, what about migration? How do you get from where you are to where you want to be? It’s time to fine-tune your authentication strategy. Join Hannah Preston, Solution Strategist, Payment Security at CA to learn how to:

    • Design the best payment security architecture for your business
    • Exploit the power of a consistent device identity across online channels
    • Incorporate a global network of devices to shut down fraud fast
  • CA Briefings Part 2: How to Control Risk & Enable Trust in the Digital Economy Recorded: Jan 11 2018 61 mins
    Speakers - David Duncan, VP, Security, CA Technologies; Brandon Dunlap, Moderator
    The application economy is altering the way we live, work, and interact. As a result, organizations are transforming the way they provide services to customers, employees, and partners. But no matter how these services are accessed, a fundamental concern remains: How does an organization protect sensitive data, while still allowing a frictionless and enjoyable user experience?Join David Duncan, VP, Security of CA Technologies and (ISC)2 on Thursday, January 11, 2018 at 1:00PM Eastern for examination of the cybersecurity risks that can result from application development and what it takes to future-proof business trust.
  • Insider Threats: Exclusive Peer Perspectives, Strategies and Tactics Recorded: Dec 12 2017 53 mins
    Rob Marti, Director of Privileged Access Management, CA Technologies
    Discover the trends and opinions about insider threats that your peers have revealed in the recently published Cybersecurity Insiders report.

    Join Rob Marti, Director of Privileged Access Management at CA Technologies, as he guides you through the report and examines technologies and preventative measures.

    Selecting the right insider threat solution is a pivotal decision; make sure you know your options.
  • CA Briefings Part I: Privileged Access Management in a DevOps environment Recorded: Dec 7 2017 59 mins
    Steven McCullar, Advisor, Solution Strategy, CA; Scott Willson, Product Marketing Dir, Release Automation, CA; B. Dunlap,
    Access to and within DevOps environments have proliferated over the past few years, with both users and scripts (with embedded credentials). This privileged identity sprawl poses significant risks that need to be addressed.Join CA Technologies and (ISC)2 on December 7, 2017 at 1:00PM Eastern. In this session, we'll look at the technology and approach that CA takes to secure such environments.
  • How to Use Attack Path Mapping to Prescribe Security Controls. Hosted by ISACA Recorded: Dec 5 2017 64 mins
    Ed Parsons, Associate Director at MWR InfoSecurity and Naresh Persaud, Sr. Director of Security at CA Technologies
    A new technology has emerged called Attack Path Mapping (APM). APM lets you evaluate the probability of the hacker kill chain and quantify the risks, significantly reducing risks through more effective controls.

    Join Ed Parsons, Associate Director at MWR InfoSecurity and Naresh Persaud, Sr. Director of Security at CA Technologies as they share how APM can help companies think like a hacker, leveraging insight to resolve vulnerabilities.

    What’s more, find out how Scotia Gas Network and National Center for Cyber Security are successfully employing Attack Path Mapping … today.
  • Securing Identities & Earning Consumer Trust in the Mobile Commerce World Recorded: Nov 30 2017 62 mins
    Al Pascual, Research Dir, Javelin Strategy & Research & Carol Alexander, Sr Dir, Digital Payments Security, CA Technologies
    Mobile is increasingly becoming a part of every consumers’ identity. In fact, it has proven to be at the center of consumers’ financial lives, providing a boon for financial institutions. However, the increasing use of this digital channel is escalating the security risks faced by consumers and institutions.

    Join Javelin Strategy & Research and CA Technologies to learn about such advances in authentication as, real-time behavioral analytics, machine learning, and 3-D Secure 2.0. Advancements that are designed to secure accounts and payments, without overburdening consumers with a friction-laden experience.

    •How the confluence of mobile banking and payments is influencing future standards
    •How consumer expectations are evolving with their mobile channel experiences
    •How financial institutions and service providers should be securing their accounts
  • Adaptive Thinking: How Capital One Combats Fraud Recorded: Nov 16 2017 40 mins
    Dave Laramy, Director of Fraud Strategy, Capitol One & Hannah Preston, Solution Strategist, Payment Security, CA
    Capital One is a Top 10 credit card issuer in the UK and is recognized as an award winner for its exceptional customer experience. The team's philosophy to continually try new things, allows them to successfully balance tighter fraud prevention and increased customer satisfaction. In fact, Capital One readily adopted the CA Payment Security Suite to help ensure that balance.

    Join Dave Laramy, Director of Fraud Strategy at Capital One and Hannah Preston, Solution Strategist, Payment Security at CA as they share tactics to eliminate legacy fraud controls and embrace more efficient ways to battle the bad guys with intelligent data and authentication.

    Tune in and explore how to:
    • Implement best practices and strategies for leveraging data and authentication
    • Improve fraud prevention and the checkout experience with 3DS 2.0
    • Prepare for regulatory changes, scheme mandates, and future transformations
  • Using Managed Security Services? You Need Identity Management! Recorded: Nov 9 2017 56 mins
    Naresh Persaud, Sr. Dir. Security, Prod. Mgmt. CA; Greg Shanton, VP Cyber Security, Neovera; B. Dunlap
    Set to double in the next two years, the managed security services market is being driven by the rising cost of security. One MSP found the formula for success by using Identity Management not only to streamline internal security controls but to also help customers reduce risk. If you are using or planning to use managed security services, join CA and (ISC)2 on November 9, 2017 at 1:00PM Eastern to discover the security requirements that require identity and access. We'll discuss use cases managed security companies are addressing and provide insight on how best of breed companies are adapting.
  • CA PAM 3.0.1 - What's New Recorded: Nov 2 2017 39 mins
    Mike Dullea, Senior Director of Product Management for PAM. CA Technologies
    The recently updated CA Privileged Access Manager provides a simple, secure, and scalable Privileged Access Management capability that organizations can use to meet their current and evolving needs. The release includes:

    • Graphical redesign of the user interface to provide consistency, improved usability and a modernized look
    • New management console to offer greater visibility into clustered environments for large multi-department and Managed Service Provider (MSP) environments
    • Augmented session recording, encryption and crypto module enhancements to support deployments of all sizes
    • And more

    Please join Mike Dullea, Senior Director of Product Management for PAM at CA Technologies, as he guides you through many of the new use cases in this release and demonstrates the enhanced user experience.
  • A Crisis of Trust: The Vulnerabilities of Usernames & Passwords. Recorded: Nov 1 2017 43 mins
    David Duncan, Vice President, Product & Solutions Marketing, Security, CA Technologies
    ***Security Alert: Unusual Activity Detected. Your company has suffered a data breach.***

    In today’s brave new world, where the Internet is used for everything from finance to heathcare, traditional usernames and passwords are, in fact, reckless. If we want to erase Hacker Headlines, we need a new model of Trust for Digital Identities.

    So, what’s the answer? Join David Duncan, Vice President, Security at CA Technologies, to discuss:
    • Risks posed to your business by legacy authentication
    • Problems inadvertently created by human behavior
    • New model for digital identity that leverages user Digital DNA and risk analytics

    Let us show you how CA Technologies can help you reduce identity theft and fraud, while building sustainable online Trust.
  • Business Insight: How to Interpret the Gartner Market Guide for PAM Recorded: Oct 19 2017 36 mins
    Suresh Sridharan, Director Privileged Access Management, CA Technologies
    The Gartner 2017 Market Guide for Privileged Access Management (PAM) reviews 24 vendors across various categories. This comprehensive information can help you find an ideal solution for your unique business needs. Yet, selecting the right PAM solution is a pivotal decision; it is critical to weigh your options.

    Make an informed decision. Join Suresh Sridharan, Director Privileged Access Management at CA Technologies, as he guides you through report recommendations, evaluates the latest tools and technologies, and compares and contrasts industry choices.
  • PSD2 and 3-D Secure 2.0: Setting New Standards - Hosted by PYMNTS.com Recorded: Oct 18 2017 60 mins
    Michael Sass, Mastercard; James Rendell, CA Technologies
    The Payment Industry has seen its fair share of innovation, but there’s never been a more exciting time for Payments than now. New technology is everywhere – Selfie Pay, Tokenization, Biometric Authentication. And with new technology, there is the inescapable need for advanced security.

    In fact, several global initiatives have surfaced to make electronic payments safer – including PSD2 and 3-D Secure 2.0. This means big changes for banks, merchants, PSPs, and consumers. Are you prepared?
    Join industry leaders from Mastercard and CA Technologies for a straightforward look at how to take advantage of these innovations. You’ll be briefed on:
    • Regulatory technical standards on strong customer authentication
    • Best practices to reduce abandonment rates and fraud
    • Key dates, choices, and planning considerations to implement the new protocols

    Host: Karen Webster, CEO, PYMNTS
    • Michael Sass, Vice President, Market Product Management, Security Solutions, Europe, Mastercard
    • James Rendell, Vice President, Product Management, Payment Security, CA Technologies
  • A NIST Guide on How Identity Management is Reshaping Cyber Security Recorded: Oct 12 2017 60 mins
    Bill Newhouse, Deputy Director, NICE; Naresh Persaud, Sr. Dir. Security; Prod Mktg, CA; Spencer Wilcox; Brandon Dunlap
    Did you know that 80% of data breaches implicate lost, stolen and weak credentials, as well as excessive access as culprits? NIST’s National Cybersecurity Center of Excellence (NCCoE) is helping companies better understand how to apply standards-based, commercially available technologies to improve their cybersecurity posture. The NCCoE’s security control mappings, reference designs, and lab implementations can be used as roadmaps or checklists for organizations looking to bolster their cybersecurity programs. Join CA and (ISC)2 on October 12, 2017 at 1:00PM Eastern for our ThinkTank where our expert panel will take an in depth look at how Identity Management is shaping the recommendations and requirements for the next generation of cyber security controls.
  • Protect Your Data Privacy with Data-Centric Security Recorded: Sep 27 2017 42 mins
    Stuart McIrvine Vice President, Mainframe Security Product Management
    Data privacy isn’t an easy task, you need to ensure the security of sensitive information while complying with a variety of regulations. But data privacy never ends and the laws are constantly changing. The answer? A data-centric security strategy covers all corporate data, so you can connect everyone to everything while staying in complete control. The challenge? Knowing where all your mainframe data is located, how it’s being used, who has access to it, and whether it’s compliant with industry regulations.
    Join Stuart McIrvine, Vice President of Mainframe Security Product Management to cover the foundation of building data-centric security strategies that cover all corporate data, simplify regulatory compliance, and outline how to leverage security as a competitive advantage, from mobile to mainframe.
  • How to Jump Start GDPR with Identity & Access Management. Hosted by ISACA Recorded: Sep 27 2017 54 mins
    Christian Almskou, Senior Partner, ICY Security & Paul Ferron, Director Digital Identity Strategy, CA Technologies
    More than 50% of businesses today don't have a strategy to address the European General Data Protection Regulation (GDPR). For companies that fail to comply, the cost can be high - as much as 4% of annual turnover. Take control. Learn the steps to successfully implement GDPR.

    Join Christian Almskou, Senior Partner ICY Security and Paul Ferron, Director Digital Identity Strategy, CA Technologies as they share perspectives on how to:
    •Put breach notifications in place
    •Establish repeatable controls and governance
    •Prevent data breaches from happening

    Join us for this informative peer session to help jump start GDPR.
Educational webcasts for the IT Security Professional
The CA Technologies Security Management solutions help CSOs and security professionals move the business forward by facilitating growth, innovation and collaboration, and driving IT operational excellence, all while managing risk and compliance. CA Technologies will show you how businesses can gain the control they need over physical, virtual, and cloud IT environments—so they can protect the business and the information on which it relies.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Are You Getting the Most Out of Your IAM System? Four Ways to Find Out
  • Live at: Jan 27 2016 7:40 pm
  • Presented by: Derek Brink, VP and IT Research Fellow at Aberdeen Group & Sumner Blount, Director, Security Solutions at CA Technologies
  • From:
Your email has been sent.
or close