Hi [[ session.user.profile.firstName ]]

Moving IAM to the Cloud: The Right Model for Your Business

Identity and Access Management (IAM) in the cloud has emerged as an important issue for IT and security teams across all types of organizations. Still many strategic questions remain around migrating IAM to the cloud including:

· How do I choose the right cloud service provider?

· What security services should I migrate to the cloud?

· How should I migrate IAM to the cloud?

· What relevant industry standards do I need to consider for IAM in the cloud?

This panel session will take aim at the tough decisions facing CSOs and CIOs when considering IAM in the cloud. This panel will clarify the major points that organizations have to get right to ensure a successful migration of IAM services to the cloud and how to discover what model makes the most sense for their organization.

Panel:

Joni Brennan, ED, Kantara Initiative (moderator)
Carlos Garcia, DAPS, Identity and Access Management, Large Healthcare Provider
Josh Hammer, Product Manager, Mycroft;
Alan Norquist, CEO, Veriphy; and,
Jim Reno, CTO, CA Technologies.
Recorded Oct 17 2012 57 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jim Reno, CTO, CA; Josh Hammer, Product Manager, Mycroft; Alan Norquist, Veriphyr; Joni Brennan, ED, Kantara Initiative
Presentation preview: Moving IAM to the Cloud: The Right Model for Your Business

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • CA Briefings Part 2: How to Control Risk & Enable Trust in the Digital Economy Jan 11 2018 6:00 pm UTC 60 mins
    Speakers - David Duncan, VP, Security, CA Technologies; Brandon Dunlap, Moderator
    The application economy is altering the way we live, work, and interact. As a result, organizations are transforming the way they provide services to customers, employees, and partners. But no matter how these services are accessed, a fundamental concern remains: How does an organization protect sensitive data, while still allowing a frictionless and enjoyable user experience?Join David Duncan, VP, Security of CA Technologies and (ISC)2 on Thursday, January 11, 2018 at 1:00PM Eastern for examination of the cybersecurity risks that can result from application development and what it takes to future-proof business trust.
  • Insider Threats: Exclusive Peer Perspectives, Strategies and Tactics Dec 12 2017 6:00 pm UTC 60 mins
    Rob Marti, Director of Privileged Access Management, CA Technologies
    Discover the trends and opinions about insider threats that your peers have revealed in the recently published Cybersecurity Insiders report.

    Join Rob Marti, Director of Privileged Access Management at CA Technologies, as he guides you through the report and examines technologies and preventative measures.

    Selecting the right insider threat solution is a pivotal decision; make sure you know your options.
  • CA Briefings Part I: Privileged Access Management in a DevOps environment Dec 7 2017 6:00 pm UTC 75 mins
    Steven McCullar, Advisor, Solution Strategy, CA; Scott Willson, Product Marketing Dir, Release Automation, CA; B. Dunlap,
    Access to and within DevOps environments have proliferated over the past few years, with both users and scripts (with embedded credentials). This privileged identity sprawl poses significant risks that need to be addressed.Join CA Technologies and (ISC)2 on December 7, 2017 at 1:00PM Eastern. In this session, we'll look at the technology and approach that CA takes to secure such environments.
  • Adaptive Thinking: How Capital One Combats Fraud Recorded: Nov 16 2017 40 mins
    Dave Laramy, Director of Fraud Strategy, Capitol One & Hannah Preston, Solution Strategist, Payment Security, CA
    Capital One is a Top 10 credit card issuer in the UK and is recognized as an award winner for its exceptional customer experience. The team's philosophy to continually try new things, allows them to successfully balance tighter fraud prevention and increased customer satisfaction. In fact, Capital One readily adopted the CA Payment Security Suite to help ensure that balance.

    Join Dave Laramy, Director of Fraud Strategy at Capital One and Hannah Preston, Solution Strategist, Payment Security at CA as they share tactics to eliminate legacy fraud controls and embrace more efficient ways to battle the bad guys with intelligent data and authentication.

    Tune in and explore how to:
    • Implement best practices and strategies for leveraging data and authentication
    • Improve fraud prevention and the checkout experience with 3DS 2.0
    • Prepare for regulatory changes, scheme mandates, and future transformations
  • Using Managed Security Services? You Need Identity Management! Recorded: Nov 9 2017 56 mins
    Naresh Persaud, Sr. Dir. Security, Prod. Mgmt. CA; Greg Shanton, VP Cyber Security, Neovera; B. Dunlap
    Set to double in the next two years, the managed security services market is being driven by the rising cost of security. One MSP found the formula for success by using Identity Management not only to streamline internal security controls but to also help customers reduce risk. If you are using or planning to use managed security services, join CA and (ISC)2 on November 9, 2017 at 1:00PM Eastern to discover the security requirements that require identity and access. We'll discuss use cases managed security companies are addressing and provide insight on how best of breed companies are adapting.
  • CA PAM 3.0.1 - What's New Recorded: Nov 2 2017 39 mins
    Mike Dullea, Senior Director of Product Management for PAM. CA Technologies
    The recently updated CA Privileged Access Manager provides a simple, secure, and scalable Privileged Access Management capability that organizations can use to meet their current and evolving needs. The release includes:

    • Graphical redesign of the user interface to provide consistency, improved usability and a modernized look
    • New management console to offer greater visibility into clustered environments for large multi-department and Managed Service Provider (MSP) environments
    • Augmented session recording, encryption and crypto module enhancements to support deployments of all sizes
    • And more

    Please join Mike Dullea, Senior Director of Product Management for PAM at CA Technologies, as he guides you through many of the new use cases in this release and demonstrates the enhanced user experience.
  • A Crisis of Trust: The Vulnerabilities of Usernames & Passwords. Recorded: Nov 1 2017 43 mins
    David Duncan, Vice President, Product & Solutions Marketing, Security, CA Technologies
    ***Security Alert: Unusual Activity Detected. Your company has suffered a data breach.***

    In today’s brave new world, where the Internet is used for everything from finance to heathcare, traditional usernames and passwords are, in fact, reckless. If we want to erase Hacker Headlines, we need a new model of Trust for Digital Identities.

    So, what’s the answer? Join David Duncan, Vice President, Security at CA Technologies, to discuss:
    • Risks posed to your business by legacy authentication
    • Problems inadvertently created by human behavior
    • New model for digital identity that leverages user Digital DNA and risk analytics

    Let us show you how CA Technologies can help you reduce identity theft and fraud, while building sustainable online Trust.
  • Business Insight: How to Interpret the Gartner Market Guide for PAM Recorded: Oct 19 2017 36 mins
    Suresh Sridharan, Director Privileged Access Management, CA Technologies
    The Gartner 2017 Market Guide for Privileged Access Management (PAM) reviews 24 vendors across various categories. This comprehensive information can help you find an ideal solution for your unique business needs. Yet, selecting the right PAM solution is a pivotal decision; it is critical to weigh your options.

    Make an informed decision. Join Suresh Sridharan, Director Privileged Access Management at CA Technologies, as he guides you through report recommendations, evaluates the latest tools and technologies, and compares and contrasts industry choices.
  • PSD2 and 3-D Secure 2.0: Setting New Standards - Hosted by PYMNTS.com Recorded: Oct 18 2017 60 mins
    Michael Sass, Mastercard; James Rendell, CA Technologies
    The Payment Industry has seen its fair share of innovation, but there’s never been a more exciting time for Payments than now. New technology is everywhere – Selfie Pay, Tokenization, Biometric Authentication. And with new technology, there is the inescapable need for advanced security.

    In fact, several global initiatives have surfaced to make electronic payments safer – including PSD2 and 3-D Secure 2.0. This means big changes for banks, merchants, PSPs, and consumers. Are you prepared?
    Join industry leaders from Mastercard and CA Technologies for a straightforward look at how to take advantage of these innovations. You’ll be briefed on:
    • Regulatory technical standards on strong customer authentication
    • Best practices to reduce abandonment rates and fraud
    • Key dates, choices, and planning considerations to implement the new protocols

    Host: Karen Webster, CEO, PYMNTS
    Guests:
    • Michael Sass, Vice President, Market Product Management, Security Solutions, Europe, Mastercard
    • James Rendell, Vice President, Product Management, Payment Security, CA Technologies
  • A NIST Guide on How Identity Management is Reshaping Cyber Security Recorded: Oct 12 2017 60 mins
    Bill Newhouse, Deputy Director, NICE; Naresh Persaud, Sr. Dir. Security; Prod Mktg, CA; Spencer Wilcox; Brandon Dunlap
    Did you know that 80% of data breaches implicate lost, stolen and weak credentials, as well as excessive access as culprits? NIST’s National Cybersecurity Center of Excellence (NCCoE) is helping companies better understand how to apply standards-based, commercially available technologies to improve their cybersecurity posture. The NCCoE’s security control mappings, reference designs, and lab implementations can be used as roadmaps or checklists for organizations looking to bolster their cybersecurity programs. Join CA and (ISC)2 on October 12, 2017 at 1:00PM Eastern for our ThinkTank where our expert panel will take an in depth look at how Identity Management is shaping the recommendations and requirements for the next generation of cyber security controls.
  • Protect Your Data Privacy with Data-Centric Security Recorded: Sep 27 2017 42 mins
    Stuart McIrvine Vice President, Mainframe Security Product Management
    Data privacy isn’t an easy task, you need to ensure the security of sensitive information while complying with a variety of regulations. But data privacy never ends and the laws are constantly changing. The answer? A data-centric security strategy covers all corporate data, so you can connect everyone to everything while staying in complete control. The challenge? Knowing where all your mainframe data is located, how it’s being used, who has access to it, and whether it’s compliant with industry regulations.
    Join Stuart McIrvine, Vice President of Mainframe Security Product Management to cover the foundation of building data-centric security strategies that cover all corporate data, simplify regulatory compliance, and outline how to leverage security as a competitive advantage, from mobile to mainframe.
  • How to Jump Start GDPR with Identity & Access Management. Hosted by ISACA Recorded: Sep 27 2017 54 mins
    Christian Almskou, Senior Partner, ICY Security & Paul Ferron, Director Digital Identity Strategy, CA Technologies
    More than 50% of businesses today don't have a strategy to address the European General Data Protection Regulation (GDPR). For companies that fail to comply, the cost can be high - as much as 4% of annual turnover. Take control. Learn the steps to successfully implement GDPR.

    Join Christian Almskou, Senior Partner ICY Security and Paul Ferron, Director Digital Identity Strategy, CA Technologies as they share perspectives on how to:
    •Put breach notifications in place
    •Establish repeatable controls and governance
    •Prevent data breaches from happening

    Join us for this informative peer session to help jump start GDPR.
  • Shoring up Your Defenses by Leveraging Analytics and Machine Learning Recorded: Aug 24 2017 65 mins
    Mark McGovern, VP, Product Mgmt., CA; John Carnes, Infosecurity Senior Adviser, Anthem; Erik Von Geldern, FXCM
    Attackers are getting quicker and more sophisticated. Today's enterprise defenders aren’t able to withstand the pace and complexities of the threats they face. Automated tools and intelligence are being deployed to breach your IT infrastructure and access your priceless data by targeting privileged accounts. In playing defense, security teams must become proactive, not reactive and use data and analytics in a meaningful way, being more effective and agile in detecting attackers and quickly thwarting them. Join CA Technologies and (ISC)2 on August 24, 2017 at 1:00PM Eastern for a discussion on emergence of machine learning and security analytics as tools that organizations can leverage to defend their data and some practical ways it can be used to protect key assets such as privileged accounts.
  • Live Demonstration of CA Privileged Access Manager Recorded: Aug 23 2017 22 mins
    John Christensen
    Join us for a live demo of CA PAM. We'll highlight key features & functions as well as show you standard use cases.
  • Destination: 3-D Secure 2.0 - Hosted by PYMNTS.com Recorded: Aug 18 2017 61 mins
    Ankur Karer, Director of Payment Security Presales, CA Technologies
    After a 17-year journey through hardships & learning experiences, 3-D Secure is finally undergoing a much-needed overhaul. EMVCo has released EMV 3-D Secure 2.0 (3DS 2.0); optimized for mobile and traditional web browser transactions.

    The new protocol delivers important additional e-commerce transaction metadata, including an extensive set of device data. This enhanced data will facilitate even greater fraud prevention gains for customers, who participate in cardholder authentication programs based on 3-D Secure.

    Join Ankur Karer, Director of Payment Security Presales at CA Technologies to learn how 3-D Secure 2.0 is poised to change online payments authentication.
    • Discover the key drivers that influenced this indisputable transformation
    • Evaluate the important benefits for mobile and in-app purchases
    • Analyze the significant new data elements to combat fraud
  • We Need a Trust and Transparency Model for The Internet of Things Recorded: Aug 16 2017 64 mins
    Sean Martin, ITSPmagazine | David Billeter and Naresh Persaud, CA Technologies | Mandeep Khera
    Today, security on the Internet is dependent on the trust between participants on the network. This is challenging because trust involves more than humans in this case and there are over 8.7 Billion devices already online today. And, trust is about to become more involved because, according to a Cisco study, 99% of the things in the world today will be connected to the Internet in the near future which means we will need a new model for trust and digital identity to manage this massive scale of trust we will need.

    In this ITSPmagazine webinar, a panel of subject matter experts will explore the challenges and solutions to building trust on the Internet of things, looking at what identity means in the world of mobile devices and other Internet-connected things. Remember, it's not just the user that has an identity...

    Some of the topics planned for the discussion include:
    - What are some of the devices we see being used in business?
    - Why do devices need identities?
    - What does device-to-user authentication look like?
    - What does device-to-device authentication look like?
    - What role do applications play in the IoT world?
    - How can all of these identities and activities be managed and policies enforced at scale?

    --------

    Moderator
    - Sean Martin, CISSP, Editor-in-Chief at ITSPmagazine

    Expert Panelists
    - David Billeter, CISO at CA Technologies
    - Mandeep Khera, Information Security Thought Leader and Executive
    - Naresh Persaud, Sr. Director Security, Product Marketing, CA Technologies
  • Securing the Connected Mainframe Recorded: Jun 7 2017 57 mins
    Jeff Cherrington, Senior Director Product Mgmt at CA Technologies, Deb Gannaway, Technology Executive at DG Technologies
    Over 62% of security professionals don’t know where all their sensitive data is – do you? The challenge is that the mainframe hosts most of the world’s mission-essential, regulated corporate data and interconnects with everything else in your business - making it more vulnerable to threat than ever before.

    Join Jeff Cherrington, Senior Director of Product Management at CA Technologies and Deb Gannaway, Technology Executive at DG Technologies on June 7th at 2pm EST to learn how to:

    • Find lost, abandoned and even hidden data on your mainframe
    • Classify data based on regulation or sensitivity level to satisfy compliance
    • Protect mainframe data to stay in full control of critical business assets

    Is your as mainframe secure as it should be? Identify the vulnerabilities
  • Stop Fraud Instantly & Reduce CNP Fraud Loss by 25% - hosted by PYMNTS.com Recorded: May 25 2017 59 mins
    James Rendell, VP Payment Security, CA; Paul Dulany, VP Data Science, CA; Karen Webster, CEO MPD
    Too often card issuing banks suffer significant loss from fraudsters stealing credit card credentials. Typically, these fraudsters use multiple cards from multiple issuers to complete purchases from a single device before the stolen cards can be blocked. The goal is to immediately identify and stop fraudulent transactions, while maintaining a frictionless shopping experience.

    CA Risk Analytics Network (CA RAN) is a unique, e-commerce fraud risk evaluation solution that stops fraud instantly and helps banks cut card-not-present (CNP) fraud losses by 25% and increase fraud detection by 20% (1, 2).

    Please join this exclusive briefing to learn more about CA RAN and how it can help:
    • Tap into the largest network of global cardholders and transaction data, gathered by CA’s industry-leading CA Payment Security Suite
    • Stop fraud immediately with real-time learning and instant risk score updates, based on behavioral analytics
    • Boost top-line revenue, while improved fraud detection reduces potential losses for better bottom-line results

    1. CA data science simulation on 50 CA Payment Security Suite customers.
    2. Results dependent on issuer-defined operational thresholds over a single issuer mode.
  • Securing Privileged Access Across the Hybrid Enterprise Recorded: May 18 2017 48 mins
    Mike Annau, Senior Presales Consultant, CA Technologies
    Whether they are obtained maliciously or leveraged inappropriately by a valid user, exploited privileged user accounts are the common threat of most data breaches.

    Find out how CA Privileged Access Management (CA PAM) can provide the end-to-end control over privileged users, from the gateway to the server and from the database to the cloud – all from a single management console:

    •Protect against data breaches while improving access protecting administrative credentials and automating login across multiple target devices and platforms with secure single sign-on.
    •Reduce the impact of insider threats monitor, record and audit all activity with immediate playback.
    •Satisfy regulatory compliance and audit requirements with 360˚access controls across all environments including cloud, hybrid and NSX.
  • Password Security: An End of an Error. Hosted by PYMNTS.com Recorded: Apr 3 2017 62 mins
    Hannah Preston, Solution Strategist, Payment Security Division, CA Technologies & Karen Webster, CEO, MPD
    Say goodbye to the beloved password. The payments industry is about to initiate the biggest global authentication upgrade in over a decade. Are you ready?

    Join Hannah Preston, Solution Strategist, Payment Security Division, CA Technologies and Karen Webster, CEO, Market Platform Dynamics to learn how authentication is evolving; how it could transform your security and user experience; and how you can tackle the choices and consequences.
    •Examine the possible vulnerabilities for consumers and the opportunities for fraudsters
    •Assess physical authentication confidence and the merits of an in-app authentication strategy through biometrics
    •Exploit the experience of organizations, who have already replaced weak authentication
    •Learn how the EBA’s decision to relax controversial PSD2 authentication rules could affect your business
Educational webcasts for the IT Security Professional
The CA Technologies Security Management solutions help CSOs and security professionals move the business forward by facilitating growth, innovation and collaboration, and driving IT operational excellence, all while managing risk and compliance. CA Technologies will show you how businesses can gain the control they need over physical, virtual, and cloud IT environments—so they can protect the business and the information on which it relies.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Moving IAM to the Cloud: The Right Model for Your Business
  • Live at: Oct 17 2012 3:00 pm
  • Presented by: Jim Reno, CTO, CA; Josh Hammer, Product Manager, Mycroft; Alan Norquist, Veriphyr; Joni Brennan, ED, Kantara Initiative
  • From:
Your email has been sent.
or close