Webinars

Webinars

  • What to Expect: Future Trends in Identity and Access Management

    Considering how much—and frequently—security shifts in the customer landscape, we believe Identity Management is at the epicenter of digital transformation and the next generation of enterprise IT. The changes in identity systems and services over the next five years are expected to be as disruptive as the new business models, applications and ecosystems they are supporting. In our presentation we will look ahead to the future of identity & access management, talk about specific projections as to where we believe Identity Management will be going over the next five years and describe a model for identity abstraction that provides an extensible services oriented architecture. We include newer disruptive models such as DevOps/microservices in identity systems, cloud-based IAM, self-sovereign identity leveraging blockchain, IoT support, evolving privacy regulations, and new governance and provisioning models. Read More

  • What to Expect: Future Trends in Identity and Access Management

    Considering how much—and frequently—security shifts in the customer landscape, we believe Identity Management is at the epicenter of digital transformation and the next generation of enterprise IT. The changes in identity systems and services over the next five years are expected to be as disruptive as the new business models, applications and ecosystems they are supporting. In our presentation we will look ahead to the future of identity & access management, talk about specific projections as to where we believe Identity Management will be going over the next five years and describe a model for identity abstraction that provides an extensible services oriented architecture. We include newer disruptive models such as DevOps/microservices in identity systems, cloud-based IAM, self-sovereign identity leveraging blockchain, IoT support, evolving privacy regulations, and new governance and provisioning models. Read More

  • Securing the Hybrid Workforce – Establishing Trust in a Zero Trust World

    It's no longer news that we need to support and secure increasingly distributed organizations. As companies look for long-term solutions for their hybrid and fully remote workforces, one thing is clear - identity is the new perimeter for businesses today. An identity-first approach to security reduces today's cybersecurity risks and provides the foundation for a zero trust security strategy. A modern Identity solution can also help you tie the complexities of protecting people and assets together in a seamless way. Join this session to learn: • How to enable and secure a hybrid workforce • How identity can lay the foundation for any zero trust security initiative • What zero trust projects your peers are thinking about now and into the next 12-18 months Read More

  • Live analysis: 2021 Hacker-Powered Security Report

    Attack surfaces are growing due to cloud migrations and widespread outsourcing. But security teams don’t know where they’re vulnerable—and can’t keep up with emerging threats in their supply chain. Watch this recording of HackerOne’s CISO, Chris Evans, to learn how ethical hackers help security teams gain control, even in the most highly regulated industries. Chris provides expert context for the findings in the latest Hacker-Powered Security Report: Industry Insights. Watch the session to: Understand how you can use the report to reduce your application exploitability Find out how and why the OWASP Top 10 vulnerabilities are changing—and what that means for your security priorities Learn which strategies work best for your industry, based on data from HackerOne’s global customers Get your questions about application security, vulnerabilities, and bug bounty trends answered by an industry veteran Read More

  • Automation & Security in a Cloud DevOps World

    Making manual changes to cloud environments is one of the leading causes for security breaches. Learn how to build an automated environment following DevSecOps best practices to protect yourself from unintended changes. Read More

  • Zero Trust Security Automation: Supercharging Your Dilithium Crystals

    Cloud Security Operations teams have a multitude of responsibilities, including vulnerability management, threat management, security and infrastructure configuration and management, as well as incident response. Clearly, they need modern tools to help them manage and make sense of the volume of data and work across their complex environments. However, the fractured and disconnect enterprise security ecosystem makes this difficult or impossible in most environments. Zero Trust security brings with it the possibility of applying a holistic and unified policy model across these heterogeneous environments. Zero Trust has become mainstream, even being mandated by the recent US Presidential executive statement ordering such an approach for US government agencies. So, how does Zero Trust apply to cloud SecOps environments? In this fireside chat, two industry experts share their thoughts and insights on this topic. Attendees will learn: • What is Zero Trust, and how does it apply to Cloud SecOps? • Why automation is critical to a successful Zero Trust program, and even more important for Cloud SecOps • Why Zero Trust policies are so important in cloud environments • Ways in which workload metadata and user attributes are used in Zero Trust policies • How organizations can implement “security as code” with a Zero Trust approach Read More

  • Why an integrated approach to security is no longer a choice

    Threats have changed over the years and so have the targets. It’s not just your perimeter that is at risk, it’s your customers, your supply chain, your employees and your business reputation that could be easily tarnished with just one breach. In this session, we’ll cover how and why you should consider an integrated approach to IT security, with an ecosystem of vendors that work together for the greater good. One solution will not solve all the threats, a layered approach is better but deep integration with the sharing of threat data at speed is a modern necessity. In the session we will cover: • How to look at an integrated approach to IT security. • Why a layered approach is good but integrated is better. • Integrations and Mimecast 1+1=3 Read More

  • Detect Cloud Threats via Monitoring

    Cloud adoption has witnessed exponential growth over the past few years. It provides many advantages for both individuals and organizations. However, at the same time, many new cyber security risks have arisen due to this rapid growth of cloud adoption. These new security risks can be mitigated by adhering to cloud adoption good practices. One of those steps is monitoring the cloud entities once the workloads have been deployed. Unfortunately, this is perhaps the most overlooked aspect of cloud security, thus enabling Threat Actors to launch Cyber Attacks against deployed workloads. In this presentation we will discuss: • Importance of monitoring your cloud entities • How cloud monitoring helps with threat detection • Steps to keep cloud entities safe Read More

  • Best Practices for Cloud Monitoring and Breach Prevention

    John Christly, VP and CISO at Core Business Solutions joins BrightTalk to discuss some best practices as it relates to protecting your systems and data in the cloud. As more and more companies seek to migrate to the cloud and as data breaches and issues such as ransomware continue to create havoc for companies, the need to protect these systems becomes a major issue that needs careful consideration. This session will explore solutions to this challenge and offer some best practices that should be deployed to give you, your company, and your customers better piece of mind. Read More