Hi [[ session.user.profile.firstName ]]

CA Briefings Part 4: Step 3: Secure and Simplify Cloud Access

The steps for strengthening your enterprise and increasing customer engagement has seen the rise of cloud adoption and a "bring your own app" trend in the workplace which continues to grow. IT and security leaders are hard pressed to keep up with the demands of a seamless user experience while protecting user identities across the cloud environment. On December 8, 2016 at 1:00PM Eastern, CA Technologies and (ISC)2 will examine how to leverage identity-as-a-service to secure access to cloud applications - including provisioning, onboarding and deployment, deliver a seamless user experience without compromising security and how to keep up with the pace of cloud adoption.
Recorded Dec 8 2016 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Hadeel Dabbagh, Sr. Principal Product Mgr; Kathy Hickey, VP, Product Mgmt.; Brandon Dunlap (Moderator)
Presentation preview: CA Briefings Part 4: Step 3: Secure and Simplify Cloud Access

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Securing the Connected Mainframe Jun 7 2017 6:00 pm UTC 60 mins
    Jeff Cherrington, Senior Director Product Mgmt at CA Technologies, Deb Gannaway, Technology Executive at DG Technologies
    Over 62% of security professionals don’t know where all their sensitive data is – do you? The challenge is that the mainframe hosts most of the world’s mission-essential, regulated corporate data and interconnects with everything else in your business - making it more vulnerable to threat than ever before.

    Join Jeff Cherrington, Senior Director of Product Management at CA Technologies and Deb Gannaway, Technology Executive at DG Technologies on June 7th at 2pm EST to learn how to:

    • Find lost, abandoned and even hidden data on your mainframe
    • Classify data based on regulation or sensitivity level to satisfy compliance
    • Protect mainframe data to stay in full control of critical business assets Is your as mainframe secure as it should be? Identify the vulnerabilities.
  • Password Security: An End of an Error. Hosted by PYMNTS.com Recorded: Apr 3 2017 62 mins
    Hannah Preston, Solution Strategist, Payment Security Division, CA Technologies & Karen Webster, CEO, MPD
    Say goodbye to the beloved password. The payments industry is about to initiate the biggest global authentication upgrade in over a decade. Are you ready?

    Join Hannah Preston, Solution Strategist, Payment Security Division, CA Technologies and Karen Webster, CEO, Market Platform Dynamics to learn how authentication is evolving; how it could transform your security and user experience; and how you can tackle the choices and consequences.
    •Examine the possible vulnerabilities for consumers and the opportunities for fraudsters
    •Assess physical authentication confidence and the merits of an in-app authentication strategy through biometrics
    •Exploit the experience of organizations, who have already replaced weak authentication
    •Learn how the EBA’s decision to relax controversial PSD2 authentication rules could affect your business
  • The Key to Regulatory Compliance? Comprehensive Mainframe Security Recorded: Mar 28 2017 42 mins
    Chip Mason, Director of Mainframe Security Product Management, CA Technologies
    Data privacy regulations and standards are only increasing to improve the protection of your most sensitive business assets; consider the General Data Protection Regulation, EU-US Privacy Shield and Payment Card Industry Data Security Standard (PCI DSS) and more. The reality with data is, the mainframe stores the majority of the world’s corporate data. And the other reality is, not many know where all of that data is, let alone able to facilitate regulatory compliance.

    Join Chip Mason, Director of Mainframe Security Product Management on Tuesday, March 28th to discuss the impact of these regulations to your business, what you need to do to comply, and how comprehensive mainframe security management can help you meet these standards and demonstrate compliance with ease.
  • CA Briefings Part 6: Step 4: Governance and Tying it all Together Recorded: Mar 21 2017 60 mins
    John Hawley, VP Security Strategy, CA Technologies; Brandon Dunlap (Moderator)
    Controlling the access of all users, especially privileged ones, is essential not only for risk reduction but also for easier compliance. But, controlling access isn't enough. Organizations need to govern all user access to ensure that no user has more access than they need, and that segregation of duties policies are enforced. On March 21, 2017 at 1:00PM Eastern, CA Technologies and (ISC)2 will highlight the steps for strengthening the enterprise and increasing customer engagement as well as key aspects of effective identity governance, including for contractors and partners who might have access to your systems. Included in the discussion will be key capabilities and processes to help create leading-edge identity governance deployments that can improve the security of your critical data and simplify compliance audits.
  • Mainframe Security 101: What Your CISO Needs To Know Recorded: Feb 15 2017 59 mins
    Jeff Cherrington, Senior Director of Mainframe Security Product Management, CA Technologies
    The mainframe is mission essential in the application economy and hosts the majority of the world’s corporate data, processes over 2.5 billion mobile transactions per day and touches 55% of all applications. And while the connected mainframe drives significant business value, it also brings sophisticated threats and looming regulations along with it.

    Join Jeff Cherrington, Senior Director of Mainframe Security Product Management at CA Technologies for an overview of the mainframe security landscape, examine how the mainframe fits into the overall enterprise security strategy, and best-practices on how to secure the most sensitive and regulated data in the business - from access control to data protection to compliance.
  • Successful Identity Management Deployments – Don’t forget the user experience Recorded: Jan 18 2017 57 mins
    Sumner Blount, Director, Security Solutions, CA Technologies
    A critical element to the success of an identity management deployment is the user experience, but it’s often overlooked, or not given high enough priority. An identity management deployment without a seamless, convenient user experience could be the make or break point for success.

    This webcast will highlight critical components of a convenient and secure user experience. Attendees will learn:
     Current trends in identity management and governance
     Essential characteristics of employee, partner, and customer identity management
     Key attributes of a successful identity management user experience with examples
     Recommendations for a successful identity management deployment
  • CA Briefings Part 5: Annual Trends/Predictions Recorded: Jan 12 2017 58 mins
    Nick Nikols, Senior VP and Cybersecurity Business CTO, CA; Brandon Dunlap, Moderator
    2016 was a blockbuster year for cybersecurity -- from a hacker influenced national election to a landmark breach into the Internet of Things that caused the largest botnet attacks in history. What’s in store for 2017? On January 12, join CA Technologies’ Nick Nickols, Security CTO, as he examines the evidence and trends that predict what you can expect in 2017. In this webcast, Nick will discuss:
    ·Key areas to focus your attention and investment - from access governance to threat analytics to IDaaS
    ·The changing landscape of regulations and consumer behavior
    ·Technology transformations and new innovations that will influence the way you prepare for 2017
  • Threat Analytics - The Key to Protecting Privileged Access and Preventing Breach Recorded: Dec 13 2016 58 mins
    Mark McGovern, VP, Product Management, CA Technologies
    The hacker economy thrives on information fueled by techniques, tools and experience to run effective and targeted cyberattacks. One of the top goals for cyber attackers is to gain control of a privileged account and insiders can pose even more risk for an enterprise, yet according to a recent analyst report, only 1% of breaches are detected by monitoring programs. But there is hope. Threat analytics are the essential component in detecting and mitigating breaches.

    In this webcast, we will discuss approaches to analyzing real time privileged user activity information, provide examples of real time threat analytics and discuss how to detect and mitigate breaches before they ruin your business.
  • Privacy by Design: How to Protect your Hybrid Enterprise from the Inside Out Recorded: Dec 13 2016 37 mins
    Paul Ferron, Digital Identity Strategist CA Technologies EMEA and John McGonagle, Sr. Associate, DLA Piper
    As organisations transform digitally the opportunity exists to build security into the network and infrastructure from the beginning. The new EU General Data Protection Regulation extends to virtual and cloud environments as well as traditional on-premise – and there are implications for moving and sharing data within these environments too.

    Join this webcast with Paul Ferron, Digital Identity Strategist CA Technologies EMEA and Giulio Coraggio, Partner and Head of the Italian Technology Sector at DLA Piper as they explore

    -How to balance digital transformation with compliance and protect PII while also enabling identities.
    -How a Privacy by Design approach enables companies to realise economic growth by building Trusted Digital Relationships with stakeholders.
    -Using Trusted Digital Relationships as a basis for GDPR compliance.
    -Implications of GDPR on data sharing
    -How to leverage GDPR to benefit consumers
  • CA Briefings Part 4: Step 3: Secure and Simplify Cloud Access Recorded: Dec 8 2016 60 mins
    Hadeel Dabbagh, Sr. Principal Product Mgr; Kathy Hickey, VP, Product Mgmt.; Brandon Dunlap (Moderator)
    The steps for strengthening your enterprise and increasing customer engagement has seen the rise of cloud adoption and a "bring your own app" trend in the workplace which continues to grow. IT and security leaders are hard pressed to keep up with the demands of a seamless user experience while protecting user identities across the cloud environment. On December 8, 2016 at 1:00PM Eastern, CA Technologies and (ISC)2 will examine how to leverage identity-as-a-service to secure access to cloud applications - including provisioning, onboarding and deployment, deliver a seamless user experience without compromising security and how to keep up with the pace of cloud adoption.
  • Security Breach Alert and General Data Protection Regulation Recorded: Nov 22 2016 44 mins
    Paul Ferron, Digital Identity Strategist CA Technologies EMEA and Giulio Coraggio, Partner and
    According to Forrester 80% of security breaches involve the use or abuse of privileged credentials. Whether malicious or accidental under the new EU General Data Protection Regulation (GDPR) organisations will have to notify all stakeholders – including consumers of the breach and its impact on their data within a strict 72 hour timeframe.

    The question is – can you afford for this to happen? Not only do breaches impact your brand integrity, but you could be fined up to euro 20M or 4% of your annual global turnover should this happen.

    In this webcast Paul Ferron, Digital Identity Strategist from CA Technologies is joined by Global legal expert Giulio Coraggio, Partner and Head of the Italian Technology Sector at DLA Piper to discuss:

    -How to minimize impact and also prevent breaches from happening.
    -How to put data breach notification into place.
  • 3D Secure 2.0 Changes Everything: How Card Issuers Can Prepare. Recorded: Nov 4 2016 59 mins
    James Rendell, CA Technologies; Paul Baker, MasterCard; Karen Webster, Market Platform Dynamics
    Globally acknowledged, 3D Secure 2.0’s impact on the financial industry will be one of the most significant in recent years.

    Built around the increasing popularity of mobile commerce, 3D Secure 2.0 is predicated on risk-based authentication, leveraging data points for accurate verification, while optimizing the consumer experience. But, what are the choices and consequences of migration?

    Join e-commerce advisors James Rendell, CA Technologies; Paul Baker, MasterCard; and Karen Webster, Market Platform Dynamics for an enlightening discussion into 3D Secure 2.0. Get individual and industry perspectives on:
    •Payment authentication, its importance to fraud prevention and to e-commerce security
    •Successful 3DS 2.0 adoption, including Service Provider and Software Developer viewpoints
    •Key initiatives – like MasterCard Identity Check Program: Mobile as a biometric authentication solution for cardholders – and the effect on online shopping
  • CA Briefings Part 3: Step 2: Protect from Within - Requirements for PAM Recorded: Nov 3 2016 60 mins
    John Hawley, VP of Security Strategy & Trevor Brown, Project Manager, CA Technologies and Brandon Dunlap, Moderator
    Identity is the new perimeter for Security in the digital enterprise. According to Forrester, 80% of security breaches involve the use or abuse of privileged credentials. At the same time, compliance mandates (such as PCI) require organizations to focus on how they manage and control privileged users in order to protect these critical resources. Privileged Access Management (PAM) provides a host of capabilities that enable organizations to address these critical challenges. Join CA Technologies and (ISC)2 on November 3, 2016 at 1:00PM Eastern as we continue examining the steps for strengthening your enterprise and increasing customer engagement highlighting emerging requirements in privileged access management and present key capabilities that are important in a comprehensive PAM solution.
  • Digital Identities & General Data Protection Regulation Recorded: Oct 27 2016 36 mins
    Paul Ferron, Digital Identity Strategist CA Technologies EMEA and Giulio Coraggio, Partner and Head of the Italian Technology
    Do you know where all of your Personal Identifiable Information is hiding?

    Just like rabbits, personal identifiable information (PII) proliferates without control, however carefully you set out to manage it initially it’s likely to be contained in multiple places across your organisation. Understanding where PII is located and who is using your PII is a fundamental step in becoming compliant to GDPR.

    Searching for and classifying structured and unstructured data is just part of the challenge you’re faced with under General Data Protection Regulation (GDPR) where the definition of what constitutes PII are also far broader than the current privacy laws and extend to more types of organisation both in and outside of the EU.

    In this webcast Paul Ferron, Digital Identity Strategist from CA Technologies is joined by Giulio Coraggio, Partner and Head of the Italian Technology Sector at DLA Piper to discuss:

    -What is PII, how to locate, manage and protect it
    -How to govern and manage information including who has access
    -How to manage legitimate access v’s potential data breaches
    -How to ensure fair processing of data and the ‘right to be forgotten’
  • Privileged Credentials are Under Attack, Restore Trust with “Defense in Depth” Recorded: Oct 11 2016 58 mins
    Steve McCullar, Sr. Director, Security Solutions at CA Technologies
    Over 80% of security breaches involve privileged credentials, according to industry analysts, which makes protecting privileged user access absolutely critical.

    To do that, you must build a zero-trust defense in depth system to protect privileged credentials.

    Join Steve McCullar of CA Technologies in a live webcast to learn how:

    •The military principle of defense in depth security can be applied to privileged access management.
    •Make it more difficult for the “enemy” --implement a layered privileged access management defense system that combines a ‘zero-trust’ network-based and host-based security
  • CA Briefings Part 2: Step 1: Protecting the Front Door with SSO & Authentication Recorded: Oct 6 2016 60 mins
    Carol Alexander, Sr. Dir Security, CA Technologies; Rob Marti, Princ, Prod. Mgr, CA.; Brandon Dunlap
    Making it easy for your customers to engage with you requires frictionless security. Begin by ensuring you have modern single sign-on and authentication to provide compelling, simple, yet non-intrusive environments for your customers. Continuing the examination of steps for strengthening your enterprise and increasing customer engagement, join CA and (ISC)2 on October 6, 2016 at 1:00PM for Part 2 of our Briefings series where we'll examine how to employ analytics to streamline the path to your applications, address hybrid environments (both SaaS and on premise) and ensure AA and SSO are meeting continually emerging challenges of the digital enterprise.
  • Reality Check for Digital Wallet Security Recorded: Sep 29 2016 25 mins
    Hannah Preston (Hannah.Preston@ca.com), Solution Strategist, Payment Security, CA Technologies & D.J. Murphy, CNP
    Consumers want payment options that function in all channels—research confirms it. They want to buy things with as little frustration as possible and merchants want to accept payments from legitimate customers. It seems so simple.

    As digital wallets emerge, however, security remains the primary hurdle facing mobile payments. How do digital wallets fit into the formula of customer convenience and merchant confidence?

    Join Hannah Preston, Solution Strategist, Payment Security Division, CA Technologies and D.J. Murphy, Editor-in-Chief, CardNotPresent.com as they discuss digital wallet adoption and how companies can keep pace with the demands of mobile commerce, while balancing fraud risks.

    Learn the "must haves" for any digital wallet solution:
    • Specifically designed to fuel the mobile economy, avoiding the frustration and complexity of legacy payment infrastructure
    • Securely provisioned with the cardholder's credentials, a vital feature for card issuers who want to offer cardholders digital wallet platforms
    • Industry sanctioned to effect a large scale shift in payment culture for merchants, issuers and customers
  • Compliance = Security: Why the Math Doesn’t Add Up Recorded: Sep 8 2016 54 mins
    Gedeon Hombrebueno, Director of Security Solutions (CA Technologies) and Piyush Pandey, Senior Manager Cyber Risk (Deloitte)
    Business leaders believe compliance can keep them out of harm’s way. Yet the majority of organizations are not anywhere close to being safe from attacks. Why the disconnect?

    Join Gedeon Hombrebueno (CA Technologies) and Piyush Pandey (Deloitte) as they discuss the importance of taking IT security measures beyond standards or regulations, and how to establish the necessary privileged access management controls to not only prevent data breaches, but also to satisfy audit and compliance demands.

    You will learn:
    • Why a “compliance based approach” to security is inadequate and flawed
    • How to move from a compliance-based approach to risk-based approach
    • How Privileged Access Management can help address compliance requirements, using PCI DSS compliance as an example
  • Payment Security: Aligning to a Broader “Digital Business Transformation” Agenda Recorded: Sep 2 2016 59 mins
    James Jenkins, Director, Payment Security Solutions, CA Technologies and Karen Webster, CEO, Market Platform Dynamics
    It’s no secret that e-commerce is one of the biggest drivers of digital business transformation. This is due, primarily, to customers demanding the highest quality experience. No interruptions. No complex passwords. No incessant authentication requests … all without sacrificing security.

    Enter Payment Security solutions from CA. These intelligent solutions not only let you build a secure e-commerce strategy centered on customer value, but also a broader digital business transformation plan focused on competitive advantage.

    Want to learn more? Join James Jenkins, Director, Payment Security Solutions, CA Technologies and Karen Webster, CEO, Market Platform Dynamics as they discuss why banks and card issuers are at a pivotal juncture to embrace digital business transformation. Discover:
    What technology, applications, and digital all have in common when it comes to the new e-commerce strategy.
    •How business units can collectively drive enhanced digital services, combat fraud, and increase business performance.
    •Why these evolutionary times are accelerating the Digital Business Transformation agenda
    •What the experts are saying about digital strategies, focus areas, and best practices
  • CA Briefings Part 1: The Digital Marketplace & Cybersecurity Recorded: Sep 1 2016 61 mins
    Michelle Waugh, Security Business, CA Technologies; Brandon Dunlap
    Your business is part of a new digital reality and the digital relationships you have with individuals are your greatest assets. They are also the new perimeter, where identities are the unifying control point across apps & data and users demand access and insight with an exceptional user experience. While all this drives your business, it also opens you up to attacks and breaches. Join CA Technologies and (ISC)2 on September 1, 2016 at 1:00PM Eastern for this first event of a six-part webcast series where you will learn how leaders can adapt to the new digital reality -- embrace new identity and access management strategies that allow you to innovate in ways you never imagined.
Educational webcasts for the IT Security Professional
The CA Technologies Security Management solutions help CSOs and security professionals move the business forward by facilitating growth, innovation and collaboration, and driving IT operational excellence, all while managing risk and compliance. CA Technologies will show you how businesses can gain the control they need over physical, virtual, and cloud IT environments—so they can protect the business and the information on which it relies.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: CA Briefings Part 4: Step 3: Secure and Simplify Cloud Access
  • Live at: Dec 8 2016 6:00 pm
  • Presented by: Hadeel Dabbagh, Sr. Principal Product Mgr; Kathy Hickey, VP, Product Mgmt.; Brandon Dunlap (Moderator)
  • From:
Your email has been sent.
or close