How Much Risk is Too Much? Leveraging Identity Governance to Manage Risk

As you face an increasing number of identities with the inclusion of different types of business users, techniques such as risk-based access and entitlement catalogs become essential to mitigating the risks to your business. Join CA Technologies for a look at current trends in the industry such as how increased interaction with business users impacts the identity management lifecycle, and the privileged identity management strategies and techniques necessary to guard against breaches. This session will offer recommendations for increasing engagement with identity services across your open enterprise
Watch Now

Spotlight

Some of the highest profile hackers and cyber-security specialists have converged on Las Vegas for the Black Hat hacker conference. To report from Sin City, RT America’s Simone Del Rosario had to take some special precautions – including leaving behind anything that could be hacked.


OTHER ON-DEMAND WEBINARS

" Intelligence Redux: Injecting Threat Intelligence into Your Security Organization"

HyperArts

With the escalation of data breaches and threat impacts, there is an ever increasing emphasis on integrating threat intelligence tools and technologies into an organization’s security program. In this presentation, we discuss the challenges and pitfalls associated with creating a true threat intelligence program as well as offer potential solutions for the practitioner to consider.
Watch Now

"Digital First World: Data Sovereignty and Privacy in the Cloud"

"Businesses today operate across more geographic boundaries than ever before and as data travels globally, a company's compliance, risk, and data governance obligations become exponentially more complex. Data moving across public and private clouds also increases breach risk, and compliance regulators can stop projects in their tracks - sometimes with drastic consequences to the business. How is information stored and managed in the cloud? A question every company should be asking when dealing with the privacy and security of information stored in the cloud. Join our panel of AvePoint experts, led by Dana Simberkoff, Chief Compliance and Risk Officer, to discuss data sovereignty and privacy in the cloud. With many factors to be taken into consideration, our panel offers tips and advice to help understand the existing or upcoming data protection laws in the EU and ways technology can keep your data safe in the cloud."
Watch Now

Your APT Tool Kit

"Jason Steer details a case study published by FireEye and KPMG, which offers some very interesting findings. Jason then goes on to illustrate at a high-level, what your APT ToolKit should include. Agenda: - KPMG & FireEye case study 13 out of the14 organisations studied were compromised - find out why. - What can an APT Toolkit achieve? 1.Detection 2.Validation 3.Containment 4.Remediation "
Watch Now

"Securing Gene Sequencing Data on AWS"

"In this webinar, learn how GenomeNext utilized security-as-a-service (SaaS) with Alert Logic to secure their applications on AWS, and how you can securely plan, architect, and execute similar big data projects. What will attendees take away from the session? • How GenomeNext met key compliance requirements, including ongoing log management, intrusion detection, and scalable web application firewall (WAF) coverage • How to architect on AWS for big data projects like genome sequencing • How to design application security so that it integrates with AWS • How to take the heavy lifting out of compliance with AWS and Alert Logic services "
Watch Now

Spotlight

Some of the highest profile hackers and cyber-security specialists have converged on Las Vegas for the Black Hat hacker conference. To report from Sin City, RT America’s Simone Del Rosario had to take some special precautions – including leaving behind anything that could be hacked.

resources