IDaaS: Your Identity Fabric. Connecting Every User to Every Service, Seamlessly

IBM

Workforce mobility, rapidly changing business models and business partnerships contribute to a trend where businesses must be able to seamlessly enable access for everyone, to every digital service. These services might be public cloud, they might be web applications with or without support for federation standards, they might be solely backend services accessed via APIs, or even legacy applications exposed only via some sort of middleware. However, agility in the digital journey mandates that IT can provide seamless access to all these services while keeping in control and enforcing security. Identity as a Service offering, whether deployed from a public or hybrid cloud, can take a central role, by acting as the common fabric connecting all the users and all the services. Such services include support for adaptive authentication, auditing features, broad federation services, authorization capabilities, and various capabilities.
Watch Now

Spotlight

As cloud has moved from the leading edge to the mainstream, the requirements for cloud management have evolved. Enterprises need an agile framework that will allow them to integrate multiple cloud environments seamlessly and update them quickly as business and technology requirements change. Many organizations are now integrating artificial intelligence and machine learning into their hybrid cloud environments.

OTHER ON-DEMAND WEBINARS

The Role of Threat Intelligence in Cyber Resilience

Omnibus healthcare information security

When security controls fail, can you detect unusual and anomalous activity with sufficient context to accurately ascertain the risk to the organization? Most organizations don't even know when security controls have failed. This is a primary reason why intrusions exist in organizations for upwards of 200 days before being discovered. Additionally, heuristic and homogeneous alerts provide virtually zero context about anomalous activity inside the internal network and do nothing to help cyber defense teams prioritize and correctly remediate cyberattacks.
Watch Now

Presidential Executive Order on America’s Cybersecurity Workforce - Enhancing Workforce Mobility and Supporting the Development of Cybersecurity Skills

NIST

On May 2, 2019, the President issued an Executive Order that recognized America’s cybersecurity workforce as a strategic asset that protects the American people, the homeland, and the American way of life. The executive order further recognized the need to enhance workforce mobility to improve cybersecurity and the importance of supporting the development of cybersecurity skills. This webinar will provide insights into the policy established through this executive order, the tasks and deliverables contained within it, and the consultative process to be used to execute recommendations from the 2017 Report to the President on Supporting the Growth and Sustainment of the Nation’s Cybersecurity Workforce.
Watch Now

11 Ways to Defeat Two-Factor Authentication

KnowBe4

Everyone knows that two-factor authentication (2FA) is more secure than a simple login name and password, but too many people think that 2FA is a perfect, unhackable solution. It isn't! Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and security expert with over 30-years experience, for this webinar where he will explore 11 ways hackers can and do get around your favorite 2FA solution. The webinar includes a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your 2FA solution so that you get maximum benefit and security.
Watch Now

Cyber Threat Hunting: Identify and Hunt Down Intruders

InfoSec Institute

Are you red team, blue team — or both? Get an inside look at the offensive and defensive sides of information security in our upcoming webinar series. Senior security researcher and InfoSec Instructor Jeremy Martin discusses what it takes to be modern-day threat hunter during this on-demand webinar, Cyber Threat Hunting: Identify and Hunt Down Intruders. The webinar covers: The job duties of a Cyber Threat Hunting professional.
Watch Now

Spotlight

As cloud has moved from the leading edge to the mainstream, the requirements for cloud management have evolved. Enterprises need an agile framework that will allow them to integrate multiple cloud environments seamlessly and update them quickly as business and technology requirements change. Many organizations are now integrating artificial intelligence and machine learning into their hybrid cloud environments.

resources