Hi [[ session.user.profile.firstName ]]

The IAM-as-an-API Era Has Arrived - And You Can Blame/Thank Mobility

Enterprise IT faces a tension between capitalizing on the new API economy through externally facing APIs, and traditional tight governance practices found in service-oriented architectures (SOA). But the development of mobile-friendly web services has forced a discipline all its own - the convergence of IAM practices with those of API Security and Management. This discipline can make mobile app developers, IT operations and security look like heroes - but to do it, IT needs to apply "ubiquitous mobile-cloud API" thinking to all the web services they oversee, whether they’re externally published or not.

Please join guest speaker Eve Maler, Principal Analyst at Forrester Research, Inc., and Tyson Whitten, Director, Security Solutions at CA Technologies, to learn how consumerization and 'webdevification' of IT are challenging IAM traditions, how to apply a Zero Trust model to "bring-your-own" environments and how you can leverage emerging IAM and API technologies to accelerate the delivery of secure mobile solutions.
Recorded Oct 30 2013 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Eve Maler, Principal Analyst at Forrester Research, Inc., and Tyson Whitten, Director, Security Solutions at CA Technologies
Presentation preview: The IAM-as-an-API Era Has Arrived - And You Can Blame/Thank Mobility

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Using Managed Security Services? You Need Identity Management! Nov 9 2017 6:00 pm UTC 75 mins
    Naresh Persaud, Sr. Dir. Security, Prod. Mgmt.; Greg Shanton, Global Cyber Security Lead, Neoverra; Brandon Dunlap, Moderator
    Set to double in the next two years, the managed security services market is being driven by the rising cost of security. One MSP found the formula for success by using Identity Management not only to streamline internal security controls but to also help customers reduce risk. If you are using or planning to use managed security services, join CA and (ISC)2 on November 9, 2017 at 1:00PM Eastern to discover the security requirements that require identity and access. We'll discuss use cases managed security companies are addressing and provide insight on how best of breed companies are adapting.
  • A NIST Guide on How Identity Management is Reshaping Cyber Security Oct 12 2017 5:00 pm UTC 75 mins
    Bill Newhouse, Deputy Director, NICE; Naresh Persaud, Sr. Dir. Security; Prod Mktg, CA; Brandon Dunlap (moderator)
    Did you know that 80% of data breaches implicate lost, stolen and weak credentials, as well as excessive access as culprits? The NIST Cybersecurity Center of Excellence (NCCoE) is on the cutting edge of shaping standards and is blazing a trail of how businesses can adapt and drive IT security controls. Join CA and (ISC)2 on October 12, 2017 at 1:00PM Eastern for our ThinkTank where our expert panel will take an in depth look at how Identity Management is shaping the recommendations and requirements for the next generation of cyber security controls.
  • Protect Your Data Privacy with Data-Centric Security Sep 27 2017 5:00 pm UTC 60 mins
    Stuart McIrvine Vice President, Mainframe Security Product Management
    Data privacy isn’t an easy task, you need to ensure the security of sensitive information while complying with a variety of regulations. But data privacy never ends and the laws are constantly changing. The answer? A data-centric security strategy covers all corporate data, so you can connect everyone to everything while staying in complete control. The challenge? Knowing where all your mainframe data is located, how it’s being used, who has access to it, and whether it’s compliant with industry regulations.
    Join Stuart McIrvine, Vice President of Mainframe Security Product Management to cover the foundation of building data-centric security strategies that cover all corporate data, simplify regulatory compliance, and outline how to leverage security as a competitive advantage, from mobile to mainframe.
  • Shoring up Your Defenses by Leveraging Analytics and Machine Learning Recorded: Aug 24 2017 65 mins
    Mark McGovern, VP, Product Mgmt., CA; John Carnes, Infosecurity Senior Adviser, Anthem; Erik Von Geldern, FXCM
    Attackers are getting quicker and more sophisticated. Today's enterprise defenders aren’t able to withstand the pace and complexities of the threats they face. Automated tools and intelligence are being deployed to breach your IT infrastructure and access your priceless data by targeting privileged accounts. In playing defense, security teams must become proactive, not reactive and use data and analytics in a meaningful way, being more effective and agile in detecting attackers and quickly thwarting them. Join CA Technologies and (ISC)2 on August 24, 2017 at 1:00PM Eastern for a discussion on emergence of machine learning and security analytics as tools that organizations can leverage to defend their data and some practical ways it can be used to protect key assets such as privileged accounts.
  • Live Demonstration of CA Privileged Access Manager Recorded: Aug 23 2017 22 mins
    John Christensen
    Join us for a live demo of CA PAM. We'll highlight key features & functions as well as show you standard use cases.
  • Destination: 3-D Secure 2.0 - Hosted by PYMNTS.com Recorded: Aug 18 2017 61 mins
    Ankur Karer, Director of Payment Security Presales, CA Technologies
    After a 17-year journey through hardships & learning experiences, 3-D Secure is finally undergoing a much-needed overhaul. EMVCo has released EMV 3-D Secure 2.0 (3DS 2.0); optimized for mobile and traditional web browser transactions.

    The new protocol delivers important additional e-commerce transaction metadata, including an extensive set of device data. This enhanced data will facilitate even greater fraud prevention gains for customers, who participate in cardholder authentication programs based on 3-D Secure.

    Join Ankur Karer, Director of Payment Security Presales at CA Technologies to learn how 3-D Secure 2.0 is poised to change online payments authentication.
    • Discover the key drivers that influenced this indisputable transformation
    • Evaluate the important benefits for mobile and in-app purchases
    • Analyze the significant new data elements to combat fraud
  • We Need a Trust and Transparency Model for The Internet of Things Recorded: Aug 16 2017 64 mins
    Sean Martin, ITSPmagazine | David Billeter and Naresh Persaud, CA Technologies | Mandeep Khera
    Today, security on the Internet is dependent on the trust between participants on the network. This is challenging because trust involves more than humans in this case and there are over 8.7 Billion devices already online today. And, trust is about to become more involved because, according to a Cisco study, 99% of the things in the world today will be connected to the Internet in the near future which means we will need a new model for trust and digital identity to manage this massive scale of trust we will need.

    In this ITSPmagazine webinar, a panel of subject matter experts will explore the challenges and solutions to building trust on the Internet of things, looking at what identity means in the world of mobile devices and other Internet-connected things. Remember, it's not just the user that has an identity...

    Some of the topics planned for the discussion include:
    - What are some of the devices we see being used in business?
    - Why do devices need identities?
    - What does device-to-user authentication look like?
    - What does device-to-device authentication look like?
    - What role do applications play in the IoT world?
    - How can all of these identities and activities be managed and policies enforced at scale?

    --------

    Moderator
    - Sean Martin, CISSP, Editor-in-Chief at ITSPmagazine

    Expert Panelists
    - David Billeter, CISO at CA Technologies
    - Mandeep Khera, Information Security Thought Leader and Executive
    - Naresh Persaud, Sr. Director Security, Product Marketing, CA Technologies
  • Securing the Connected Mainframe Recorded: Jun 7 2017 57 mins
    Jeff Cherrington, Senior Director Product Mgmt at CA Technologies, Deb Gannaway, Technology Executive at DG Technologies
    Over 62% of security professionals don’t know where all their sensitive data is – do you? The challenge is that the mainframe hosts most of the world’s mission-essential, regulated corporate data and interconnects with everything else in your business - making it more vulnerable to threat than ever before.

    Join Jeff Cherrington, Senior Director of Product Management at CA Technologies and Deb Gannaway, Technology Executive at DG Technologies on June 7th at 2pm EST to learn how to:

    • Find lost, abandoned and even hidden data on your mainframe
    • Classify data based on regulation or sensitivity level to satisfy compliance
    • Protect mainframe data to stay in full control of critical business assets

    Is your as mainframe secure as it should be? Identify the vulnerabilities
  • Stop Fraud Instantly & Reduce CNP Fraud Loss by 25% - hosted by PYMNTS.com Recorded: May 25 2017 59 mins
    James Rendell, VP Payment Security, CA; Paul Dulany, VP Data Science, CA; Karen Webster, CEO MPD
    Too often card issuing banks suffer significant loss from fraudsters stealing credit card credentials. Typically, these fraudsters use multiple cards from multiple issuers to complete purchases from a single device before the stolen cards can be blocked. The goal is to immediately identify and stop fraudulent transactions, while maintaining a frictionless shopping experience.

    CA Risk Analytics Network (CA RAN) is a unique, e-commerce fraud risk evaluation solution that stops fraud instantly and helps banks cut card-not-present (CNP) fraud losses by 25% and increase fraud detection by 20% (1, 2).

    Please join this exclusive briefing to learn more about CA RAN and how it can help:
    • Tap into the largest network of global cardholders and transaction data, gathered by CA’s industry-leading CA Payment Security Suite
    • Stop fraud immediately with real-time learning and instant risk score updates, based on behavioral analytics
    • Boost top-line revenue, while improved fraud detection reduces potential losses for better bottom-line results

    1. CA data science simulation on 50 CA Payment Security Suite customers.
    2. Results dependent on issuer-defined operational thresholds over a single issuer mode.
  • Securing Privileged Access Across the Hybrid Enterprise Recorded: May 18 2017 48 mins
    Mike Annau, Senior Presales Consultant, CA Technologies
    Whether they are obtained maliciously or leveraged inappropriately by a valid user, exploited privileged user accounts are the common threat of most data breaches.

    Find out how CA Privileged Access Management (CA PAM) can provide the end-to-end control over privileged users, from the gateway to the server and from the database to the cloud – all from a single management console:

    •Protect against data breaches while improving access protecting administrative credentials and automating login across multiple target devices and platforms with secure single sign-on.
    •Reduce the impact of insider threats monitor, record and audit all activity with immediate playback.
    •Satisfy regulatory compliance and audit requirements with 360˚access controls across all environments including cloud, hybrid and NSX.
  • Password Security: An End of an Error. Hosted by PYMNTS.com Recorded: Apr 3 2017 62 mins
    Hannah Preston, Solution Strategist, Payment Security Division, CA Technologies & Karen Webster, CEO, MPD
    Say goodbye to the beloved password. The payments industry is about to initiate the biggest global authentication upgrade in over a decade. Are you ready?

    Join Hannah Preston, Solution Strategist, Payment Security Division, CA Technologies and Karen Webster, CEO, Market Platform Dynamics to learn how authentication is evolving; how it could transform your security and user experience; and how you can tackle the choices and consequences.
    •Examine the possible vulnerabilities for consumers and the opportunities for fraudsters
    •Assess physical authentication confidence and the merits of an in-app authentication strategy through biometrics
    •Exploit the experience of organizations, who have already replaced weak authentication
    •Learn how the EBA’s decision to relax controversial PSD2 authentication rules could affect your business
  • The Key to Regulatory Compliance? Comprehensive Mainframe Security Recorded: Mar 28 2017 42 mins
    Chip Mason, Director of Mainframe Security Product Management, CA Technologies
    Data privacy regulations and standards are only increasing to improve the protection of your most sensitive business assets; consider the General Data Protection Regulation, EU-US Privacy Shield and Payment Card Industry Data Security Standard (PCI DSS) and more. The reality with data is, the mainframe stores the majority of the world’s corporate data. And the other reality is, not many know where all of that data is, let alone able to facilitate regulatory compliance.

    Join Chip Mason, Director of Mainframe Security Product Management on Tuesday, March 28th to discuss the impact of these regulations to your business, what you need to do to comply, and how comprehensive mainframe security management can help you meet these standards and demonstrate compliance with ease.
  • CA Briefings Part 6: Step 4: Governance and Tying it all Together Recorded: Mar 21 2017 60 mins
    John Hawley, VP Security Strategy, CA Technologies; Brandon Dunlap (Moderator)
    Controlling the access of all users, especially privileged ones, is essential not only for risk reduction but also for easier compliance. But, controlling access isn't enough. Organizations need to govern all user access to ensure that no user has more access than they need, and that segregation of duties policies are enforced. On March 21, 2017 at 1:00PM Eastern, CA Technologies and (ISC)2 will highlight the steps for strengthening the enterprise and increasing customer engagement as well as key aspects of effective identity governance, including for contractors and partners who might have access to your systems. Included in the discussion will be key capabilities and processes to help create leading-edge identity governance deployments that can improve the security of your critical data and simplify compliance audits.
  • Mainframe Security 101: What Your CISO Needs To Know Recorded: Feb 15 2017 59 mins
    Jeff Cherrington, Senior Director of Mainframe Security Product Management, CA Technologies
    The mainframe is mission essential in the application economy and hosts the majority of the world’s corporate data, processes over 2.5 billion mobile transactions per day and touches 55% of all applications. And while the connected mainframe drives significant business value, it also brings sophisticated threats and looming regulations along with it.

    Join Jeff Cherrington, Senior Director of Mainframe Security Product Management at CA Technologies for an overview of the mainframe security landscape, examine how the mainframe fits into the overall enterprise security strategy, and best-practices on how to secure the most sensitive and regulated data in the business - from access control to data protection to compliance.
  • Successful Identity Management Deployments – Don’t forget the user experience Recorded: Jan 18 2017 57 mins
    Sumner Blount, Director, Security Solutions, CA Technologies
    A critical element to the success of an identity management deployment is the user experience, but it’s often overlooked, or not given high enough priority. An identity management deployment without a seamless, convenient user experience could be the make or break point for success.

    This webcast will highlight critical components of a convenient and secure user experience. Attendees will learn:
     Current trends in identity management and governance
     Essential characteristics of employee, partner, and customer identity management
     Key attributes of a successful identity management user experience with examples
     Recommendations for a successful identity management deployment
  • CA Briefings Part 5: Annual Trends/Predictions Recorded: Jan 12 2017 58 mins
    Nick Nikols, Senior VP and Cybersecurity Business CTO, CA; Brandon Dunlap, Moderator
    2016 was a blockbuster year for cybersecurity -- from a hacker influenced national election to a landmark breach into the Internet of Things that caused the largest botnet attacks in history. What’s in store for 2017? On January 12, join CA Technologies’ Nick Nickols, Security CTO, as he examines the evidence and trends that predict what you can expect in 2017. In this webcast, Nick will discuss:
    ·Key areas to focus your attention and investment - from access governance to threat analytics to IDaaS
    ·The changing landscape of regulations and consumer behavior
    ·Technology transformations and new innovations that will influence the way you prepare for 2017
  • Threat Analytics - The Key to Protecting Privileged Access and Preventing Breach Recorded: Dec 13 2016 58 mins
    Mark McGovern, VP, Product Management, CA Technologies
    The hacker economy thrives on information fueled by techniques, tools and experience to run effective and targeted cyberattacks. One of the top goals for cyber attackers is to gain control of a privileged account and insiders can pose even more risk for an enterprise, yet according to a recent analyst report, only 1% of breaches are detected by monitoring programs. But there is hope. Threat analytics are the essential component in detecting and mitigating breaches.

    In this webcast, we will discuss approaches to analyzing real time privileged user activity information, provide examples of real time threat analytics and discuss how to detect and mitigate breaches before they ruin your business.
  • Privacy by Design: How to Protect your Hybrid Enterprise from the Inside Out Recorded: Dec 13 2016 37 mins
    Paul Ferron, Digital Identity Strategist CA Technologies EMEA and John McGonagle, Sr. Associate, DLA Piper
    As organisations transform digitally the opportunity exists to build security into the network and infrastructure from the beginning. The new EU General Data Protection Regulation extends to virtual and cloud environments as well as traditional on-premise – and there are implications for moving and sharing data within these environments too.

    Join this webcast with Paul Ferron, Digital Identity Strategist CA Technologies EMEA and Giulio Coraggio, Partner and Head of the Italian Technology Sector at DLA Piper as they explore

    -How to balance digital transformation with compliance and protect PII while also enabling identities.
    -How a Privacy by Design approach enables companies to realise economic growth by building Trusted Digital Relationships with stakeholders.
    -Using Trusted Digital Relationships as a basis for GDPR compliance.
    -Implications of GDPR on data sharing
    -How to leverage GDPR to benefit consumers
  • CA Briefings Part 4: Step 3: Secure and Simplify Cloud Access Recorded: Dec 8 2016 60 mins
    Hadeel Dabbagh, Sr. Principal Product Mgr; Kathy Hickey, VP, Product Mgmt.; Brandon Dunlap (Moderator)
    The steps for strengthening your enterprise and increasing customer engagement has seen the rise of cloud adoption and a "bring your own app" trend in the workplace which continues to grow. IT and security leaders are hard pressed to keep up with the demands of a seamless user experience while protecting user identities across the cloud environment. On December 8, 2016 at 1:00PM Eastern, CA Technologies and (ISC)2 will examine how to leverage identity-as-a-service to secure access to cloud applications - including provisioning, onboarding and deployment, deliver a seamless user experience without compromising security and how to keep up with the pace of cloud adoption.
  • Security Breach Alert and General Data Protection Regulation Recorded: Nov 22 2016 44 mins
    Paul Ferron, Digital Identity Strategist CA Technologies EMEA and Giulio Coraggio, Partner and
    According to Forrester 80% of security breaches involve the use or abuse of privileged credentials. Whether malicious or accidental under the new EU General Data Protection Regulation (GDPR) organisations will have to notify all stakeholders – including consumers of the breach and its impact on their data within a strict 72 hour timeframe.

    The question is – can you afford for this to happen? Not only do breaches impact your brand integrity, but you could be fined up to euro 20M or 4% of your annual global turnover should this happen.

    In this webcast Paul Ferron, Digital Identity Strategist from CA Technologies is joined by Global legal expert Giulio Coraggio, Partner and Head of the Italian Technology Sector at DLA Piper to discuss:

    -How to minimize impact and also prevent breaches from happening.
    -How to put data breach notification into place.
Educational webcasts for the IT Security Professional
The CA Technologies Security Management solutions help CSOs and security professionals move the business forward by facilitating growth, innovation and collaboration, and driving IT operational excellence, all while managing risk and compliance. CA Technologies will show you how businesses can gain the control they need over physical, virtual, and cloud IT environments—so they can protect the business and the information on which it relies.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The IAM-as-an-API Era Has Arrived - And You Can Blame/Thank Mobility
  • Live at: Oct 30 2013 5:00 pm
  • Presented by: Eve Maler, Principal Analyst at Forrester Research, Inc., and Tyson Whitten, Director, Security Solutions at CA Technologies
  • From:
Your email has been sent.
or close