Solving New Authentication Challenges While Finding Parity Between User Experience and Security

KuppingerCole

Unfortunately, most businesses are making the fundamental mistake when it comes to authentication and are thinking inside-out, but by thinking outside-in, they would automatically put the Customer first. Until now, strong (and not so strong) authentication to services seems to have been driven by an inside-out way of thinking. The institutions think about what works best for them: what fits into their infrastructure; what is the cheapest yet compliant approach? For customers, this means that they must use what their service provider offers to them. Companies must also be aware of insider risks and by implementing a Zero Trust approach of ‘never trust, always verify’, they can better secure the access to their assets. In this KuppingerCole webinar, we will address the following.
Watch Now

Spotlight

The digitally progressing world is posing as a roadmap to a number of cyberattacks. Anyone and everyone whose data has an online presence are susceptible to these cyber threats. These threats are just inexorable. Bringing awareness to them will help with understanding the severity of the situation. The given data ensures that you keep a keen eye on your online activities if you want to protect your sensitive data.

OTHER ON-DEMAND WEBINARS

Getting started in digital forensics

InfoSec Institute

Digital forensics is the backbone of investigating cybercrime. It includes identifying, preserving, extracting, analyzing and reporting evidence across computers, mobile devices and networks. Join Keatron Evans, Infosec instructor and Managing Partner at KM Cyber Security, for this on-demand webinar as we discuss: The difference between computer, mobile and network forensics. How a forensics certification can progress your career.
Watch Now

Navigating the Modern Security Landscape

As cyber criminals grow bolder and more sophisticated, their methods evolve. Join Allen Jenkins, InterVision’s CISO & VP of Cybersecurity Consulting, as he explores the modern security landscape. Allen will discuss recent cybersecurity attacks – including a synopsis of the attack, its impact and deconstructing how the attack happened – and a review of mitigation steps that could help organizations prepare for and respond to these types of attacks, including:
Watch Now

The Pesky Password Problem: How Hackers and Defenders Battle for Your Network Control

KnowBe4

What really makes a “strong” password? And why are your end-users tortured with them in the first place? How do hackers crack your passwords with ease? And what can/should you do about your authentication methods? In this unique webinar you will learn about the recent NIST controversy and related password cracking problems. The “combatants” will be on the one side KnowBe4's Chief Hacking Officer, Kevin Mitnick with decades of first-hand “red-side” penetration testing experience, and on the other side Roger Grimes, KnowBe4's Data-Driven Defense Evangelist with decades of experience on the blue team.
Watch Now

Private Equity Cybersecurity: Preliminary Look at Exclusive Compliance Checklist

ACG

Join ACG’s Private Equity Regulatory Taskforce (PERT) and Dennis Johnson, Wipfli LLP Risk Advisory Services Manager, as they divulge pertinent information about the best-in-class Wipfli Cybersecurity Checklist. The Cybersecurity Checklist is an exclusive perk for PERT members. However, all webinar attendees will benefit from an illuminating glimpse into the cybersecurity resource. The Cybersecurity Checklist helps firms to measure cybersecurity functions at their particular institution. It does this by using the PERT’s exclusive Cybersecurity “Principle” and the SEC’s cybersecurity guidance.
Watch Now

Spotlight

The digitally progressing world is posing as a roadmap to a number of cyberattacks. Anyone and everyone whose data has an online presence are susceptible to these cyber threats. These threats are just inexorable. Bringing awareness to them will help with understanding the severity of the situation. The given data ensures that you keep a keen eye on your online activities if you want to protect your sensitive data.

resources