How Much Risk is Too Much? Leveraging Identity Governance to Manage Risk

As you face an increasing number of identities with the inclusion of different types of business users, techniques such as risk-based access and entitlement catalogs become essential to mitigating the risks to your business. Join CA Technologies for a look at current trends in the industry such as how increased interaction with business users impacts the identity management lifecycle, and the privileged identity management strategies and techniques necessary to guard against breaches. This session will offer recommendations for increasing engagement with identity services across your open enterprise
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Investigating the Hacker Lifecycle

AITP

One of the hottest topics at RSA San Francisco 2019 was the Mitre ATT&CK framework. Along with the Lockheed-Martin Kill Chain, it has become a standard reference model for cybersecurity professionals. Specifically, it is used to describe each stage of an attack. Pen testers, security analysts and Security Operations Center (SOC) professionals must learn how to mature their operations, as well as hone the skills of red team and blue team workers.
Watch Now

Workforce continuity and the Future of Work

For the past 30 years Citrix has helped organizations like yours embrace the ‘future of work.’ We know that the ‘future’ itself is a moving target and external forces can hamper business and the workforce. To minimize the risk of unforeseen events and foster enduring competitive advantage you will learn: What is business continu
Watch Now

Intelligent API Cybersecurity, Is Your Agency Protected?

Carahsoft

As government agencies move towards digital transformation, Cyber threats are getting smarter, using social engineering, brute force methods, and even artificial intelligence (AI) to bypass common defenses to gain access to these critical systems and data. To help protect Federal Agencies against an ever-diversifying landscape of cybersecurity threats, Axway and Ping Identity have formed a global partnership to deliver a comprehensive Application program Interface (API) security solution that optimizes security at all levels, from network to application.
Watch Now

The Future of Phishing: It’s all about your customers

SEGASEC

While current anti-phishing solutions usually cover basic entry-level phishing scams using reactive inside-the-firewall defenses, a billion of potential variations of sophisticated phishing scams are already being planned and executed everywhere on the internet, entirely undisturbed, evading most current detection tools. Todays phishing attacks are no longer performed by scruffy hoodie covered villains, but by sophisticated, risk-calculating, online marketing experts who take social engineering to new heights. By constantly using A/B testing to improve their technology with each attack, they know how to tell a convincing story that would trick even the savviest users, causing irreversible reputational and financial damages to brands worldwide.
Watch Now