Hi [[ session.user.profile.firstName ]]

Identity Intelligence: Oxymoron or Reality?

Today, organizations are dealing with a proliferation of mobile devices, BYOD, the cloud and Big Data. The challenge is how to embrace these new trends and respond proactively to new and emerging threats without significantly increasing IT risk or reducing end-user productivity or satisfaction. To
Today, organizations are dealing with a proliferation of mobile devices, BYOD, the cloud and Big Data. The challenge is how to embrace these new trends and respond proactively to new and emerging threats without significantly increasing IT risk or reducing end-user productivity or satisfaction. To keep risk in check and reduce user inconvenience organizations need to consider new methods and approaches to enable identity intelligence: behavioral anomaly and pattern detection. With identity intelligence, organizations can gain deep visibility into users’ access rights and patterns as well as use of their application entitlements and mitigate risks while positively affecting the end-user experience.

During this webcast, we will explain and define identity intelligence and provide practical advice on how organizations can realize identity intelligence through a combination of identity governance and management solutions with data protection and fraud management for both on-premise and cloud-based resources. The webcast will conclude with some real-world use cases that show how identity intelligence can be a reality today for organizations of all types.
Recorded Sep 12 2012 57 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Guest speaker Andras Cser, Principal Analyst,Forrester Research,Inc; Merritt Maxim, Sr Principal CA Technologies
Presentation preview: Identity Intelligence: Oxymoron or Reality?
Recommended for you:
  • Date
  • Rating
  • Views
  • How New Devices Can Help You Make the Most of Windows 10 How New Devices Can Help You Make the Most of Windows 10 David Hollway, Mike Brohoski, & Pang Ngernsupaluck Recorded: May 4 2016 23 mins
    Together, Windows 10 and Intel deliver the productivity, security and manageability you need to advance your business.

    Intel and Microsoft have been collaborating for more than 30 years, creating technology that has changed the way we do business.

    With Windows 10, we’ve taken this partnership to a whole new level, with new hardware lighting up key Windows features that help you stay ahead of security threats, while making it easy for you to manage devices across your business.

    The new devices on Windows 10 and the new Intel 6th generation processor (Skylake) deliver:
    •Better Productivity: Do more and be more productive with improved multi-tasking, less waiting, familiar interface and app compatibility
    •Better Security: Helps protect identity, data and devices against modern security threats
    •Better Manageability: Stay current with less effort, manage devices more effectively, remotely provision and deploy applications

    Watch this webcast to:
    •Discover Windows 10 productivity, security and manageability features that new hardware lights up
    •Learn more about the Intel 6th generation processor (Skylake) and how it helps give time and money back to your company
    •Get additional resources to evaluate when it might be time for new devices and what devices are right for you
  • How New Devices Can Help You Make the Most of Windows 10 How New Devices Can Help You Make the Most of Windows 10 David Hollway, Mike Brohoski, & Pang Ngernsupaluck Recorded: May 4 2016 23 mins
    Together, Windows 10 and Intel deliver the productivity, security and manageability you need to advance your business.

    Intel and Microsoft have been collaborating for more than 30 years, creating technology that has changed the way we do business.

    With Windows 10, we’ve taken this partnership to a whole new level, with new hardware lighting up key Windows features that help you stay ahead of security threats, while making it easy for you to manage devices across your business.

    The new devices on Windows 10 and the new Intel 6th generation processor (Skylake) deliver:
    •Better Productivity: Do more and be more productive with improved multi-tasking, less waiting, familiar interface and app compatibility
    •Better Security: Helps protect identity, data and devices against modern security threats
    •Better Manageability: Stay current with less effort, manage devices more effectively, remotely provision and deploy applications

    Watch this webcast to:
    •Discover Windows 10 productivity, security and manageability features that new hardware lights up
    •Learn more about the Intel 6th generation processor (Skylake) and how it helps give time and money back to your company
    •Get additional resources to evaluate when it might be time for new devices and what devices are right for you
  • Maximiser la valeur de vos données avec une plateforme de données connectée Maximiser la valeur de vos données avec une plateforme de données connectée Abdelkrim Hadjidj, Solution Engineer, Hortonworks Recorded: May 4 2016 61 mins
    Tous les métiers ont besoin de données. Pour transformer votre organisation et exploiter vos données vous avez besoin d’une solution pour récupérer, stocker et analyser toutes les données de votre organisation. Une plateforme de données ouverte et connectée vous permettra de prendre des décisions plus rapidement. Nous vous présenterons des exemples d’entreprises qui ont migré leurs plateformes de Hadoop classique vers notre plateforme ainsi que les gains qu’ils ont obtenu.
  • Crime & Spies: The Great Indian Cyber Robbery Crime & Spies: The Great Indian Cyber Robbery Vipul Kumra,Consulting Engineer, FireEye India Recorded: May 4 2016 61 mins
    A cyber-threat group exploiting commercial entities and Government agencies across India for over a decade! Suspected Pakistani Threat Actor Using Surveillance Malware Against Indian Entities! Computers at three banks, pharmaceutical company hacked; hackers demand ransom in bitcoins!
    Almost every day news is full of stories about companies and nations grappling with the new cyber threat landscape. There is a lot more happening behind the scene.
    Join FireEye webinar “Crime & Spies: The Great Indian Cyber Robbery” to hear from the people and the organization which has been the first responder to the majority of the high profile cyber breaches across the world. FireEye has been curating intelligence on malware, advanced threat group tactics and attacker behavior for over a decade.
  • Six Key Capabilities For Securing Office 365 Email Six Key Capabilities For Securing Office 365 Email Ryan Kalember, Proofpoint SVP of Cybersecuritywith Guest Speaker Kelley Mak, Forrester Analyst Recorded: May 3 2016 62 mins
    Email remains a critical component of business process. Strong interest and adoption of Microsoft’s Office 365 online productivity and collaboration suite is pushing email to the cloud. However, Office 365 has many security and risk professionals scrambling to figure out what security controls are necessary to secure email.


    While Office 365 can provide native functionality baked in, enterprises need to understand the gaps and where additional security might be necessary to protect you from today’s advanced threats. Join Ryan Kalember, Proofpoint SVP of Cybersecurity, to discuss the key capabilities that enterprises should consider for their Office 365 email environment.


    Key takeaways include:
    • Why the shift to Office 365 increases criticality of email security
    • Common pitfalls to avoid in the planning stages
    • Key security capabilities to protect from advanced threats

    Learn more about how Proofpoint has helped customers find success with their Office 365 initiative with advanced security, end-to-end insights and rapid response capabilities, and email continuity.

    Guest speaker Kelley Mak of Forrester Research will also be on hand to discuss the industry at large from an independent perspective.
  • Achieving PCI Compliance in AWS: A Customer Case Study Achieving PCI Compliance in AWS: A Customer Case Study Matthew R. McLimans, Computer Engineer at Warren Rogers Recorded: May 3 2016 59 mins
    PCI compliance is a steep enough challenge, but what happens when your entire infrastructure is in AWS? Do the same concepts of network segmentation and separation apply, and if so how? At what point do AWS compliance efforts intersect with your compliance efforts?

    Join this webinar where we will cover how a customer is using the Palo Alto Networks VM-Series for AWS to maintain separation of data and traffic in AWS to improve security and achieve PCI compliance.
  • Key Findings from Symantec’s 2016 Internet Security Threat Report Key Findings from Symantec’s 2016 Internet Security Threat Report Kevin Haley, Director, Symantec Security Response Recorded: May 3 2016 57 mins
    Cyber attacks are increasing in number and sophistication. Today’s threats differ from those encountered a month ago. What can you do to improve your security posture?

    Register for our webcast and receive insights into protecting your organization and its brand, including simple steps to take now and in the future.
  • Corporate Governance for CISOs: Asset Management Corporate Governance for CISOs: Asset Management Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council Recorded: May 3 2016 58 mins
    Join Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council for his Corporate Governance for CISOs webinar series! The first webinar in the series will cover the topic of Asset Management from an executive perspective. This session will focus on some fundamental concerns that an organization must address to support an effective information security program. How do you identify asset owners? What are examples of effective classification strategies? What type of inventory do you maintain to manage your asset information? What relationship do asset management and change management share?
  • Stormy Weather Ahead: How to Navigate the Cloud and Stay Safe, ESG & Tufin Stormy Weather Ahead: How to Navigate the Cloud and Stay Safe, ESG & Tufin Jon Oltsik, senior principal analyst, ESG & Maya Malevich, Director of Product Marketing, Tufin Recorded: May 3 2016 54 mins
    Between constraints of IT security skills and the rise of cloud adoption it is increasingly difficult to control security policies across the heterogeneous network. Network security and operations teams are expected to ensure and initiate connectivity while protecting the attack surface from the next cyber threat and complying with internal policies and industry regulations. Join us for a Webinar session with ESG senior principal analyst Jon Oltsik, as he reviews the latest findings of a recent survey on how cloud adoption is transforming network security operations. In this session we will also examine how security policy orchestration can help address some of the key challenges of managing security and connectivity in the cloud, and across hybrid cloud and physical networks.
  • Guide to your (ISC)² Membership in EMEA: Benefits, Maintenance & Opportunities Guide to your (ISC)² Membership in EMEA: Benefits, Maintenance & Opportunities Adrian Davis, Managing Director, (ISC)² EMEA, Q&A with Membership Services Recorded: May 3 2016 59 mins
    Are you an (ISC)² member with questions about your certification? Would you like to hear more about member benefits and how (ISC)2 can help you? Join the Guide to your (ISC)2 Membership in EMEA webinar to learn more about these topics and others including:
    •CPE opportunities, member benefits and getting involved
    •Your membership requirements summarized
    •Who are the (ISC)2 EMEA team and how we can help you
    •Focus discussions
    •Q&A session

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Identity Intelligence: Oxymoron or Reality?
  • Live at: Sep 12 2012 5:00 pm
  • Presented by: Guest speaker Andras Cser, Principal Analyst,Forrester Research,Inc; Merritt Maxim, Sr Principal CA Technologies
  • From:
Your email has been sent.
or close
You must be logged in to email this