Webinars

Webinars

  • Addressing the Challenges & Capitalizing on Opportunities Provided by ESG 2.0

    The global trend toward ESG creates both challenges and opportunities for enterprises. It is no longer a matter of “should an enterprise embrace ESG?” It is a matter of how to address the challenges and capitalize on the opportunities. As investors’ appetite for sustainable investment solutions grows, there are huge innovation opportunities for those who are able to adapt to the green economy. This timely presentation will share some insights on how to adapt an enterprise’s strategic approach to succeed in the age of ESG 2.0. Here are some of the topics which will be discussed: • Discover measurement strategies to take your ESG investment strategy to the next level. • Stakeholders vs. shareholders. • John Mackey’s view of stakeholder value vs. Kevin O’Leary’s view of shareholder value (the 2019 FreedomFest debate). • Value Driver Theory and the Value Creation Process Chart. • Incorporating stakeholders into Value Driver Theory and the value creation process. • John Mackey’s Conscious Capitalism. • A Value Creation Theory of the Economy. How does ESG fit into that model? • Can you measure the impact of ESG with the discounted cash flow model (DCF)? • What ESG metrics should an enterprise use? • Doing Good is Good Business. Read More

  • Access That Puts People First

    Innovation strikes different technologies at different times. But there are moments where certain technologies aren’t just left behind–they’re trapped in the stone age. Infrastructure Access finds itself in this crisis. This session will explore the inertia preventing innovation in infrastructure access - and demonstrate how it can be overcome by putting people first. Read More

  • Build an Identity-First Security Strategy That’s Ready for Prime Time

    Identity has played a role in crime throughout the history of the world and it's no surprise that identity plays a major role in cybercrime. In fact, identity-based attacks are the leading cause of breaches today. Organizations that leverage an identity-first approach to security are far more prepared to protect themselves in today's business environment. Join this session to learn how you can adopt an identity-first approach to security to protect your organization against today's identity-based attacks. Read More

  • Identity Management Is Essential to Cloud Security

    Digital transformation and the evolution of identity in the workplace -- spurred by decentralization, cloud adoption and remote work -- have exposed the fact that old methods of identity and access management have outgrown traditional security protections, posing major risks. Adaptable and agile security architectures with a spotlight on identity are a necessity to keep employees and their organizations safe. In this panel, security experts will explore digital identity trends that bolster cloud security, as well as cybersecurity innovations that focus largely on identity, and help them understand the options. Join us to learn about: --Open identity standards and interoperability --Identity as a service --Cloud infrastructure entitlement management (CIEM) --Zero trust models --Cloud access security brokers (CASBs) Moderated by: Yotam Gutman, Director of Marketing, SentinelOne Panelists: Zain Malik, Senior Product Marketing Manager at Ping Identity Shane Moore, VP of Sales at Forcepoint Norv Leong, Head of Product Marketing at strongDM Read More

  • Impact Investing in 2022 and Beyond

    Please join three industry-renowned leaders for a frank and open conversation regarding Impact Investing; the past, present, and future of this exciting (and growing) category of investing. Our experts have a combined experience that spans the breadth of ESG investing, including research, data analysis, survey collection, and portfolio creation/management. Read More

  • Manage and Secure Identity Across Clouds

    This session covers how to manage and secure different Identity access controls across all your cloud environments. Listen to Zain Malik talk about cloud access and how to keep your access controls secure. Read More

  • The Rise of SSI and its Global Adoption

    The internet has been missing a layer of protocols addressing users’ identities. As a result, users end up losing ownership and control of their online presence to companies that create and verify identities for them. This leads to major issues, such as identity theft and fraud, and causes huge distress and loss to the users as well as severe penalties for the companies. Recently, self-sovereign identity (SSI) has emerged, placing users at the center of their identities and data. This movement involves technologists who are building open internet protocols aligned with the SSI principles. In this presentation, viewers will learn from Kaliya Young and Lucy Yang -- two experts at the forefront of protocol development and adoption -- about: • SSI’s emergence; • The latest developments in SSI protocols; and • Why adoption of SSI protocols is growing around the globe. Read More

  • A Seven-Stage Strategy for Migrating to Security Service Edge (SSE)

    Security Service Edge (SSE) boasts massive potential, but how can companies move from their portfolio of solutions to a platform approach to cybersecurity? Director of Professional Services, Abdul Pasha, walks you through the seven-stage strategy all Forcepoint customers use to migrate to SSE in 45-90 days. Joined by Corey Kiesewetter, Sr. Product Marketing Manager, the two discuss how to navigate the migration process to deploy quickly and see value immediately, without impacting operations. Read More

  • The Role of Identity in the Enterprise – An Approach to Hybrid IT

    Hybrid IT is not going away -- if anything it’s expanding and becoming mainstream as companies adapt to modern challenges. This session will cover how Okta enables companies to make the most of their Hybrid IT environment by securing on-prem applications, replacing aging legacy tech, and building a bridge between cloud and on-prem. And we’ll show a demo of how Okta enables seamless and secure access to both on-prem and cloud apps. Read More

  • Securing the Identity Perimeter with Defense in Depth

    The core tenet of a zero trust strategy is least-privilege access. Yet, organizations continue to rely on user and machine identities that are susceptible to compromise, abuse and misuse, and theft. Risk is compounded by over-permissive, static access rights that provide little to no visibility into who and what is using access and how. Vaguer is how identities should be monitored and protected. Availability of modern, cloud-managed identity services is widespread. However, organizations have been slow to pivot their security programs from traditional endpoint, network, and SecOps to an approach that focuses on identity orchestration and experiences, which is dynamic and distributed. Where there are no perimeters, a multitude of identity verification services and managed identity services exist. This research-led session will focus on how teams are responding, the identity security controls at play, and the strategies shown to be most effective. Read More