Hi [[ session.user.profile.firstName ]]

Security to, for, and from the cloud-connected enterprise

With all its inherent value, the cloud introduces new security challenges for both consumers and providers of cloud services in all types of IT environments. A challenge for enterprises is how to leverage existing investments in identity and access management (IAM) solutions and extend their reach to the cloud in a hybrid on-premise/off-premise world to reduce operational costs and enable enterprise agility. Challenges for cloud service providers include how to secure an evolving virtualized environment and how to maintain the integrity of tenant information.

Learn how Identity and Access management services, whether on-premise or in the cloud, can help you more securely access your applications and enterprise resources – wherever they may reside.
Recorded Jan 10 2013 63 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Nimrod Vax, VP Product Management
Presentation preview: Security to, for, and from the cloud-connected enterprise

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How to Enable Trust, Interoperability, & Shared Credentials Recorded: Jun 21 2018 40 mins
    Ora Niknamfard, Product Marketing Manager Security at CA Technologies
    The promise of digital identity is to remove silos; minimize redundancies; facilitate better collaboration; and shape a foundation for regulatory compliance.
    The challenge with digital identity is that it requires shared credentials that force you to deliberately assess:

    • Managing physical access
    • Protecting PII
    • Delivering cross-agency services
    • Revising digital consumer interaction

    In this session, Ora Niknamfard, Product Marketing Manager Security at CA Technologies will share industry best practices to help ensure credentials are, in fact, interoperable. Plus, you’ll have a unique opportunity to explore the architectural measures that can manage identity assurance levels and identity verification for both logical and physical access.

    Implementing a digital identity strategy can be complicated. Let CA help.
  • How to Reduce Excessive Access for Highly Privileged Users Recorded: May 31 2018 41 mins
    Naresh Persaud, Senior Director of Security at CA Technologies
    Adopting privileged access management typically means forcing users to use named accounts instead of root and administrator accounts. As a result, the volume of privileged "named user" accounts in the enterprise is increasing. Fortunately, with effective role management and certification review, organizations can streamline and reduce excessive access.

    Join Naresh Persaud, Senior Director of Security at CA Technologies as he explains the challenge of privileged user governance, explores solutions, and presents a demo on how to manage privileged "named users."
  • Security at the Speed of App Development: DevOps Meets CA Single Sign-On Recorded: May 3 2018 61 mins
    CA Hosts: Herbert Mehlhorn, Product Management & Venky Karukuri, Sr Principal Architect
    For businesses and government organizations to succeed, development and security teams must quickly build, test, and deploy secure apps and features. The challenge presented by this DevOps process? Typically, there are only a few security teams to support many development teams.

    The good news? DevOps is not just for developers anymore. Join us as we discuss how CA Single Sign-On REST APIs can help security teams:
    • Confidently create, read, update, and delete policies
    • Easily move policies from dev to staging to production
    • Efficiently keep pace with development team practices

    We’ll also cover how to apply DevOps techniques to your infrastructure, allowing security teams to better prepare for releases, minimize downtime, and avoid costly upgrades.
  • Harnessing the Power of Digital Consumer Identity Recorded: Apr 26 2018 41 mins
    Naresh Persaud, Senior Director of Security at CA Technologies
    Today’s consumers do not want to wait on the phone for customer service. Today’s consumers do not want to fill out lengthy online forms to access information or resources. In short, today’s consumers’ time is valuable and not unlimited. As a result, every company is redefining its online digital experience to maximize customer engagement, enhance brand affinity, and increase consumer wallet share.

    This is your opportunity to learn how harnessing digital consumer identity can foster an effective consumer engagement strategy. Join Naresh Persaud, Senior Director of Security at CA Technologies as he shares case studies from multiple industries that are exploiting the power of digital consumer identity to build trust and make customer interaction frictionless.
  • Agentless Access Management: Can SiteMinder Do That? Recorded: Mar 27 2018 61 mins
    Herbert Mehlhorn, Product Management and Aaron Berman, SSO and Directory Products
    Today’s CA Single Sign-On (SSO) solution is not the CA SiteMinder of yesterday. Yes, SSO continues to offer seamless access management services using traditional agents, but it also offers a new range of agentless approaches. So now, you can use single sign-on and access management for applications of all shapes and sizes.

    Join CA solution leaders − Herbert Mehlhorn, Product Management and Aaron Berman, SSO and Directory Products − to learn how agentless access management can help you:

    •Securely address critical user productivity needs
    •Transform your approach to access management
    •Foster new collaboration between security and application development teams
  • Insider Threats – Enhancing PAM as Effective Countermeasure Recorded: Mar 22 2018 49 mins
    CA Hosts: Rob Marti, Privileged Access Management Director & Alexandra Beswerchij, Product Marketing Manager
    Have you reviewed the 2018 Insider Threat Report from Cybersecurity Insiders? The results are dramatic:

    • 90% of organizations feel vulnerable to insider threats
    • Over 50% have experienced an insider attack in the past year
    • 67% cite phishing as the prime concern of attacks

    Insider Threats are real. Be ready. Join CA hosts - Rob Marti, Privileged Access Management Director and Alexandra Beswerchij, Product Marketing Manager - to review the research and discuss how a layered and comprehensive Enterprise IAM approach enhances PAM to provides an effective countermeasure to both insider attacks and external actors.

    Exploit key security tactics and strategies.
  • Preparing for GDPR Compliance and Measuring Governance Recorded: Mar 15 2018 48 mins
    CA Technologies hosts: Ora Niknamfard, Security Product Marketing Manager and Rusudan Losaberidze, Security Advisor
    Today, it’s estimated that 80% of companies are not prepared to comply with GDPR. The most challenging use cases are managing portability, conducting certification campaigns, and overseeing data access approval. Are you ready?

    Join CA Technologies hosts, Ora Niknamfard, Security Product Marketing Manager and Rusudan Losaberidze, Security Advisor as they review:

    • How compliance requirements align with legislation
    • What data collection and analysis are required
    • Informative case studies on GDPR readiness

    What’s more, we’ll demo a dashboard for the Data Protection Officer to use for compliance reporting .
  • Threat Intelligence – Hype or Hope? Recorded: Mar 8 2018 53 mins
    Mark McGovern, Vice President, Product Management, CA Technologies
    As threats and attacks become more frequent, the alerts and alarms to be investigated become more unmanageable. Plus, by the time the warnings are checked, the damage may already be done. We need a new paradigm that moves the enterprise from reactive to predictive. Can user behavior analytics and machine learning deliver the threat intelligence that is needed, and if so, how do we start to use it?

    Join Mark McGovern, Vice President, Product Management, CA Technologies as he takes a closer look at threat intelligence and its unique capabilities. The session will uncover the:

    • Challenges and benefits of collecting the data needed to detect threats
    • Immediate value and risks posed by a shared threat intelligence model
    • Advantages of applying advanced machine learning to specific problems

    Whether you are new to cybersecurity or an experienced professional, threat intelligence should be on your “need to know” security agenda.
  • GDPR & Privileged Access Management … Are You Ready? Recorded: Mar 1 2018 56 mins
    Cullen Lemley, Cybersecurity Consultant at CA Technologies
    May 25, 2018. It’s a date that is approaching quickly. It’s also the deadline for GDPR compliance. For companies that fail to comply, the cost can be high - as much as 4% of annual turnover.

    Note: There is a misconception is that the regulation affects only companies in the European Union. In fact, it applies to any company that has dealings or plans to have dealings with citizens that reside in the EU.

    Take the lead and get ready to initiate GDPR. Join Cullen Lemley, Cybersecurity Consultant at CA Technologies, for an overview of the impending regulations. Learn the important security facets of GDPR, the challenges for Privileged Access Management, and how businesses around the globe are preparing for the deadline.
  • The Network Effect: Leveraging the Power of Consortium Data Recorded: Feb 27 2018 51 mins
    CA hosts: James Rendell, VP, Product Management, Payment Security & Paul Dulany, VP, Data Science
    Today, consumers are using millions of devices to buy whatever, whenever, and wherever. However, this rapid evolution of e- and m-commerce has created a target for fraudsters to falsify identities and defraud merchants, consumers, and banks out of millions. So, how can you stay ahead of sophisticated cybercriminals, reducing CNP Fraud Losses by 25% or False Positives by 35%.

    Banks maintain a wealth of valuable data, take advantage of it. Join CA Technologies hosts, James Rendell, Vice President, Product Management, Payment Security and Paul Dulany, Vice President, Data Science to explore the benefits of CA Risk Analytics Network. This is your opportunity to learn:

    •How neural network models, machine learning & artificial intelligence can help financial services
    •How to unlock the unique data advantage that can prevent CNP fraud losses
    •How the “network effect” and real-time learning stop online fraud instantly
    •How to identify which techniques and technologies will be important in the future
    •How banks have improved their bottom line; insight from our case studies


    Webcast Hosted by ISMG
  • Insider Threats – Best Practices for Detecting and Preventing an Attack Recorded: Feb 22 2018 50 mins
    David Duncan, VP Security Marketing at CA Technologies
    Your biggest security risk may be inside your organization. Today’s most damaging threats don’t originate from criminal outsiders or malware but from insiders - both malicious and careless. So, are there preventative options?

    Join this candid discussion of cybersecurity experts – featuring David Duncan, VP Security Marketing at CA Technologies – as they reveal best practices to protect your organization and review key findings from the latest 2018 Insider Threat Report, including:

    • Why 90% of organizations feel vulnerable to insider attacks
    • How the use of behavior and data monitoring is accelerating
    • What popular technologies can help detect, deter and prevent insider attacks

    All registrants will receive a full copy of the new 2018 Insider Threats Report.

    This Panel Discussion is hosted by Cybersecurity Insiders
  • Next-Gen Directory Services: How CIAM and IoT Drive Security & Performance Recorded: Feb 15 2018 38 mins
    CA Technologies: Clayton Donley, SVP Software Engineering, Security & Rob Lindberg, Sr Principal Product Mngr, CA Directory
    The reality is that Consumer Identity and Access Management and the Internet of Things are fostering unprecedented change. The scale and types of devices and digital identities are increasing at a significant pace, driving huge security and performance concerns. These concerns have many companies asking:

    • How are potential risks being monitored and secured?
    • How are users and devices being managed?
    • How are directory services being configured?

    Learn to address these challenges, while shaping a more secure and cost-effective infrastructure.

    Join CA Technologies gurus Clayton Donley, SVP, Software Engineering, Security and Rob Lindberg, Sr Principal Product Manager, CA Directory to explore alternatives and recommendations. You'll also be able to compare performance results of leading next-gen directory services, tested and compiled by an independent, third-party.
  • Advanced Access Management for the Modern Enterprise Recorded: Feb 8 2018 37 mins
    CA Technologies hosts: Martin Yam, VP Authentication & Cloud Solutions, Carol Alexander, Senior Director, Security Products
    It’s a dilemma. Today, security must be built into mobile applications to fight rampant online fraud, but many App Developers don't have the necessary skill set … nor the time required to become proficient coders. What is the answer?

    Join CA Technologies hosts - Martin Yam, VP, Authentication & Cloud Solutions and Carol Alexander, Senior Director, Security Products - to learn how to quickly build and maintain modern, frictionless, and secure apps for your customers. It’s true. With CA Rapid App Security, developers can easily and rapidly:
    • Integrate device security and multifactor and risk-based authentication into apps
    • Eliminate dozens of complex steps, typically required for coding user and device security

    Let your developers focus on mobile applications requirements, while your business delivers a trusted user experience.
  • Reduce Risk Now with Privileged Access and Identity Management Recorded: Feb 7 2018 55 mins
    Naresh Persaud, Senior Director, Security at CA Technologies & Greg Shanton, Vice President, Cyber Security at Neovera
    Are you using or plan on using managed security services for privileged access or identity management? The market for managed security service is undergoing tremendous growth – it’s set to double within the next two years.
    Join us to learn how one MSP uses Privileged Access Management and Identity Management to streamline internal security controls and help customers reduce risk. We'll discuss use cases that managed security companies are addressing and provide insight on how best of breed companies are adapting.
  • Show Me the Mandates! How to Interpret PSD2 RTS SCA / GDPR / 3DS 2.0 Recorded: Jan 25 2018 59 mins
    CA Technologies Payment Security gurus, Product Management Advisor Jayakuma & Presales Director Matt Berryman
    Recently, there have been several payment industry initiatives designed to make electronic payments safer. Consequently, financial entities like merchants, PSPs, and consumers will soon face many changes. Although the initiatives’ premise − to eliminate vulnerabilities in the payments cycle − is welcome; businesses must now prepare to comply. Are you ready?

    Join our CA Technologies Payment Security gurus, Product Management Advisor Jayakumar Krishnasamy and Presales Director Matt Berryman to find out:
    • How to interpret the recent payment initiatives
    • If risk-based authentication satisfies mandates
    • Which strong authentication methods are compliant
  • From Where You Are to Where You Want to be with 3DS 2.0 Recorded: Jan 18 2018 23 mins
    Hannah Preston, Solution Strategist, Payment Security, CA Technologies
    3-D Secure 2.0’s impact on the financial industry will be one of the most significant in recent years. Built around the increasing popularity of mobile commerce, 3-D Secure 2.0 is predicated on risk-based authentication, leveraging data points for accurate verification, while optimizing the consumer experience.

    But, what about migration? How do you get from where you are to where you want to be? It’s time to fine-tune your authentication strategy. Join Hannah Preston, Solution Strategist, Payment Security at CA to learn how to:

    • Design the best payment security architecture for your business
    • Exploit the power of a consistent device identity across online channels
    • Incorporate a global network of devices to shut down fraud fast
  • CA Briefings Part 2: How to Control Risk & Enable Trust in the Digital Economy Recorded: Jan 11 2018 61 mins
    Speakers - David Duncan, VP, Security, CA Technologies; Brandon Dunlap, Moderator
    The application economy is altering the way we live, work, and interact. As a result, organizations are transforming the way they provide services to customers, employees, and partners. But no matter how these services are accessed, a fundamental concern remains: How does an organization protect sensitive data, while still allowing a frictionless and enjoyable user experience?Join David Duncan, VP, Security of CA Technologies and (ISC)2 on Thursday, January 11, 2018 at 1:00PM Eastern for examination of the cybersecurity risks that can result from application development and what it takes to future-proof business trust.
  • Insider Threats: Exclusive Peer Perspectives, Strategies and Tactics Recorded: Dec 12 2017 53 mins
    Rob Marti, Director of Privileged Access Management, CA Technologies
    Discover the trends and opinions about insider threats that your peers have revealed in the recently published Cybersecurity Insiders report.

    Join Rob Marti, Director of Privileged Access Management at CA Technologies, as he guides you through the report and examines technologies and preventative measures.

    Selecting the right insider threat solution is a pivotal decision; make sure you know your options.
  • CA Briefings Part I: Privileged Access Management in a DevOps environment Recorded: Dec 7 2017 59 mins
    Steven McCullar, Advisor, Solution Strategy, CA; Scott Willson, Product Marketing Dir, Release Automation, CA; B. Dunlap,
    Access to and within DevOps environments have proliferated over the past few years, with both users and scripts (with embedded credentials). This privileged identity sprawl poses significant risks that need to be addressed.Join CA Technologies and (ISC)2 on December 7, 2017 at 1:00PM Eastern. In this session, we'll look at the technology and approach that CA takes to secure such environments.
  • How to Use Attack Path Mapping to Prescribe Security Controls. Hosted by ISACA Recorded: Dec 5 2017 64 mins
    Ed Parsons, Associate Director at MWR InfoSecurity and Naresh Persaud, Sr. Director of Security at CA Technologies
    A new technology has emerged called Attack Path Mapping (APM). APM lets you evaluate the probability of the hacker kill chain and quantify the risks, significantly reducing risks through more effective controls.

    Join Ed Parsons, Associate Director at MWR InfoSecurity and Naresh Persaud, Sr. Director of Security at CA Technologies as they share how APM can help companies think like a hacker, leveraging insight to resolve vulnerabilities.

    What’s more, find out how Scotia Gas Network and National Center for Cyber Security are successfully employing Attack Path Mapping … today.
Discuss Strategies, Explore Trends
CA Technologies’ end-to-end identity and access management Security Solutions give you the freedom to connect everyone to everything from everywhere—along with the confidence that your critical corporate data is still safe and secure.

Join us for informative security discussions and technical insights led by CA Security leaders and third-party experts. We’ll cover topics around identity, privileged users, payment security, access management and other top cybersecurity trends in the industry.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Security to, for, and from the cloud-connected enterprise
  • Live at: Jan 10 2013 5:00 pm
  • Presented by: Nimrod Vax, VP Product Management
  • From:
Your email has been sent.
or close