Search results
Protecting Data in Snowflake Doesn't Have to Be Unique as a Snowflake

As organizations increasingly migrate to the cloud, securing data access becomes paramount, especially for sensitive platforms like Snowflake. Join us for an
insightful webinar on how PlainID's Policy-Based Access Control solution can enhance the security of your Snowflake environment. We will explore how
PlainID's policy-based approach allows you to control who can access what data, when, and how, without compromising flexibility or usability. In this sessio…
Stay Safe: Managing Employee Access from Cradle to Grave

In a world where the vast majority of cyber attacks leverage access-based methods to gain entry to an organization's resources, how can you be sure your
organization remains secure? This session explores best practices for ensuring all employees have the access they need, while ensuring that access is
revoked promptly when they no longer need it. It starts with the reality that most enterprises have grown to large to rely on manual efforts, needing a com…
The Emerging Role of the BISO

Webinar Overview The BISO (Business Information Security Officer) has a pivotal role – bridging cybersecurity and business goals. Security is no longer just
about protecting the business; it’s aligning security strategy with what matters most to the organization and its growth. BISOs face major challenges in
achieving these goals and desired outcomes, and we’ve identified three key areas they must address: Vendor Management Mitigating risks Managing thr…
Mastering Identity Sprawl: Centralizing IAM for Enhanced Security

As organizations grow and evolve, the proliferation of disparate identity and access management (IAM) systems can create significant security vulnerabilities.
Centralizing IAM is essential to mitigate these risks, but it presents challenges such as designing seamless interfaces and accommodating the dynamic needs
of the business. In this session, Vincent Amanyi (Founder, Boleam Inc) shares strategies to reduce fragmentation and centralize IAM systems using single si…
Stay Safe: Managing Employee Access from Cradle to Grave

In a world where the vast majority of cyber attacks leverage access-based methods to gain entry to an organization's resources, how can you be sure your
organization remains secure? This session explores best practices for ensuring all employees have the access they need, while ensuring that access is
revoked promptly when they no longer need it. It starts with the reality that most enterprises have grown to large to rely on manual efforts, needing a com…
Why Passwordless Authentication Requires a Security Paradigm Shift

Passwords increase user vulnerability. In fact, Portnox notes that 80% of data breaches today are caused by compromised credentials. The high-risk nature of
maintaining passwords—for both users and IT staff—as well as today’s onslaught of phishing attacks, begs security teams to reconsider how current
approaches (like MFA) are falling short. Join this Portnox webinar to gain a comprehensive review of passwordless authentication from our panel of internal …
CodeSign Secure: Comprehensive System Setup Tutorial

Welcome to our in-depth tutorial on setting up your CodeSign Secure system! In this video, we'll walk you through the essential steps to configure Role Based
Access Controls (RBAC), set up email notifications, manage signing projects, and fine-tune user permissions to ensure a seamless and secure code signing
experience. What You'll Learn: Role Based Access Controls (RBAC): Understand how to create and assign roles to users, ensuring that each team member …
Shaping the Future of IGA: Insights from 2025 Survey on Security Challenges, RBAC, and AI in Identity
Governance

This webinar explores how today’s enterprises are shaping their Identity Governance and Administration (IGA) strategies amid shifting security challenges.
Drawing from fresh survey research of more than 500 IT and business leaders, the discussion highlights why identity security teams are better funded than
ever and how organizations are grappling with manual processes and complex access governance. What’s Covered: - Insights from recent survey researc…
ExxonMobil shares their journey to broad attribute-based access control

organizations face the critical challenge of managing access to their systems and data efficiently. Role-based access control (RBAC) has been a popular
approach, but it often involves manual processes, leading to delays and inefficiencies. ExxonMobil is moving beyond requestable RBAC to broad,
auto-provisioned access roles, based on the identity attributes of each user. Attribute-based access control (ABAC) considers individual attributes such as or…
Mastering Identity Sprawl: Centralizing IAM for Enhanced Security

As organizations grow and evolve, the proliferation of disparate identity and access management (IAM) systems can create significant security vulnerabilities.
Centralizing IAM is essential to mitigate these risks, but it presents challenges such as designing seamless interfaces and accommodating the dynamic needs
of the business. In this session, Vincent Amanyi (Founder, Boleam Inc) shares strategies to reduce fragmentation and centralize IAM systems using single si…