Search results


Protecting Data in Snowflake Doesn't Have to Be Unique as a Snowflake

Protecting Data in Snowflake Doesn't Have to Be Unique as a Snowflake

Channel Logo
Mickey Martin, VP of Sales Engineering

As organizations increasingly migrate to the cloud, securing data access becomes paramount, especially for sensitive platforms like Snowflake. Join us for an
insightful webinar on how PlainID's Policy-Based Access Control solution can enhance the security of your Snowflake environment. We will explore how
PlainID's policy-based approach allows you to control who can access what data, when, and how, without compromising flexibility or usability. In this sessio…

Stay Safe: Managing Employee Access from Cradle to Grave

Stay Safe: Managing Employee Access from Cradle to Grave

Channel Logo
Phyllis Drucker, Influencer | EZ2BGR8 Service Management

In a world where the vast majority of cyber attacks leverage access-based methods to gain entry to an organization's resources, how can you be sure your
organization remains secure? This session explores best practices for ensuring all employees have the access they need, while ensuring that access is
revoked promptly when they no longer need it. It starts with the reality that most enterprises have grown to large to rely on manual efforts, needing a com…

The Emerging Role of the BISO

The Emerging Role of the BISO

Channel Logo
John Joyal (Sr. Product Marketing Manager at Cato Networks)

Webinar Overview The BISO (Business Information Security Officer) has a pivotal role – bridging cybersecurity and business goals. Security is no longer just
about protecting the business; it’s aligning security strategy with what matters most to the organization and its growth. BISOs face major challenges in
achieving these goals and desired outcomes, and we’ve identified three key areas they must address: Vendor Management Mitigating risks Managing thr…

Mastering Identity Sprawl: Centralizing IAM for Enhanced Security

Mastering Identity Sprawl: Centralizing IAM for Enhanced Security

Channel Logo
Vincent Amanyi, Founder | Boleaum Inc.

As organizations grow and evolve, the proliferation of disparate identity and access management (IAM) systems can create significant security vulnerabilities.
Centralizing IAM is essential to mitigate these risks, but it presents challenges such as designing seamless interfaces and accommodating the dynamic needs
of the business. In this session, Vincent Amanyi (Founder, Boleam Inc) shares strategies to reduce fragmentation and centralize IAM systems using single si…

Stay Safe: Managing Employee Access from Cradle to Grave

Stay Safe: Managing Employee Access from Cradle to Grave

Channel Logo
Phyllis Drucker, Influencer | EZ2BGR8 Service Management

In a world where the vast majority of cyber attacks leverage access-based methods to gain entry to an organization's resources, how can you be sure your
organization remains secure? This session explores best practices for ensuring all employees have the access they need, while ensuring that access is
revoked promptly when they no longer need it. It starts with the reality that most enterprises have grown to large to rely on manual efforts, needing a com…

Why Passwordless Authentication Requires a Security Paradigm Shift

Why Passwordless Authentication Requires a Security Paradigm Shift

Channel Logo
Portnox

Passwords increase user vulnerability. In fact, Portnox notes that 80% of data breaches today are caused by compromised credentials. The high-risk nature of
maintaining passwords—for both users and IT staff—as well as today’s onslaught of phishing attacks, begs security teams to reconsider how current
approaches (like MFA) are falling short. Join this Portnox webinar to gain a comprehensive review of passwordless authentication from our panel of internal …

CodeSign Secure: Comprehensive System Setup Tutorial

CodeSign Secure: Comprehensive System Setup Tutorial

Channel Logo
Riley Dickens, Senior Consultant at Encryption Consulting

Welcome to our in-depth tutorial on setting up your CodeSign Secure system! In this video, we'll walk you through the essential steps to configure Role Based
Access Controls (RBAC), set up email notifications, manage signing projects, and fine-tune user permissions to ensure a seamless and secure code signing
experience. What You'll Learn: Role Based Access Controls (RBAC): Understand how to create and assign roles to users, ensuring that each team member …

Shaping the Future of IGA: Insights from 2025 Survey on Security Challenges, RBAC, and AI in Identity Governance

Shaping the Future of IGA: Insights from 2025 Survey on Security Challenges, RBAC, and AI in Identity
Governance

Channel Logo
Paul Walker, Field Strategist, and Ander Askåsen, Product Marketing Director at Omada

This webinar explores how today’s enterprises are shaping their Identity Governance and Administration (IGA) strategies amid shifting security challenges.
Drawing from fresh survey research of more than 500 IT and business leaders, the discussion highlights why identity security teams are better funded than
ever and how organizations are grappling with manual processes and complex access governance. What’s Covered: - Insights from recent survey researc…

ExxonMobil shares their journey to broad attribute-based access control

ExxonMobil shares their journey to broad attribute-based access control

Channel Logo
Brandon L. Rogers - Senior Principal Enterprise Architect – Identity & Access Management (IAM), ExxonMobil; Ramesh Kopparapu - IGA Solution Architect, ExxonMobil

organizations face the critical challenge of managing access to their systems and data efficiently. Role-based access control (RBAC) has been a popular
approach, but it often involves manual processes, leading to delays and inefficiencies. ExxonMobil is moving beyond requestable RBAC to broad,
auto-provisioned access roles, based on the identity attributes of each user. Attribute-based access control (ABAC) considers individual attributes such as or…

Mastering Identity Sprawl: Centralizing IAM for Enhanced Security

Mastering Identity Sprawl: Centralizing IAM for Enhanced Security

Channel Logo
Vincent Amanyi, Founder | Boleaum Inc.

As organizations grow and evolve, the proliferation of disparate identity and access management (IAM) systems can create significant security vulnerabilities.
Centralizing IAM is essential to mitigate these risks, but it presents challenges such as designing seamless interfaces and accommodating the dynamic needs
of the business. In this session, Vincent Amanyi (Founder, Boleam Inc) shares strategies to reduce fragmentation and centralize IAM systems using single si…