Webinar on Zero Trust

Webinar
Dealing Effectively with Modern, Industrialized Cyber Threats

This Webinar took place on Wednesday, June 29, 2022 | 4:00pm CEST, 10:00am EST, 7:00am PST
Webinar Presentation Paul Fisher
Webinar Presentation Alan Radford

Join this Webinar to Learn About

  • Understand the common pitfalls of large-scale security change programs and how to avoid them.
  • Learn about the modern-day threats involved with identity security and how to mitigate them.
  • Discover the capabilities and value of a unified identity-centric approach to security.
  • Understand the value of integrating multiple identity technologies into a single cloud platform.
  • Get an overview of One Identity’s Unified Identity Security Platform.

How Identity is Key to a Zero-Trust Approach to Security

The cyber threat landscape has become very complex, with state-of-the-art intrusion, ransomware, and cryptocurrency mining tools now readily available through online stores and service providers, and an expanding attack surface due to increased cloud computing and remote working. Keeping data secure while ensuring its availability to legitimate users has become extremely challenging.

Join experts from KuppingerCole Analysts and One Identity as they discuss the evolution of the cyber threat landscape and consider how correlating visibility, security, and control to an identity and its associated processes and accounts can significantly mitigate against modern cyber threats.

Speakers Contribution

The cybersecurity threat landscape continues to evolve and pose new challenges to CISOs and security managers. But as Paul Fisher, Lead Analyst at KuppingerCole will explain, it isn’t just about responding to threats, but also managing identity access and cloud infrastructures in new ways.

Alan Radford, Global Identity and Access Management Strategist at One Identity will explain how to achieve a consistent view across users, machine identities, and accounts to help organizations move to a unified state. He will also highlight the importance of managing privileged users, and provide an overview of the Unified Identity Management Platform that integrates Access Management, PAM, and IGA solutions.

Paul Fisher is a Lead Analyst who researches primarily on cybersecurity and identity and access management (IAM). He also studies trends in AI, IoT and data governance for different industry sectors including automotive. Paul is responsible for managing relevant quantitative research at...

Alan is a technology strategist responsible for the PAM field strategy in EMEA for One Identity, with 15 years’ experience in Identity Access Management. An experienced business owner and subject matter expert in Identity Governance and Privileged Access Management, he has worked with...

Lead Sponsor

         FAQ

Join this combined presentation to gain quick insights and hands-on solutions from a KuppingerCole analyst and selected industry expert, finishing with by a comprehensive Q&A for your individual business challenges.

To register for the webinar, you need to log in to your KuppingerCole User first. If you do not have a KuppingerCole User yet, you can sign up here. After logging in, please enter your requested personal data which is necessary for the further administration of your registration. Once registered, a booking confirmation will be sent to your indicated email address.

Our webinars last approximately 50-60 minutes.

If you didn’t receive the booking confirmation in your inbox, please check your spam folder. If you cannot find the booking confirmation in your spam folder, please contact us. We will get back to you within one business day.

We use the "GoToWebinar" software for the webinars. Simply click on "Join the webinar" in the registration confirmation. GoToWebinar will check directly on your computer if the software is already installed. If not, the installation process will start automatically, and you only need to confirm it.

To participate, you need a computer or a laptop with Internet access. If you want to use the sound transmission via the computer, you will need headphones (headset) or speakers. You do not need a webcam or microphone. A combination of computer and telephone is also possible - you then follow the webinar via your Internet connection on the computer and dial in at the same time via telephone to listen to the moderator's explanations. You can type in questions in the chat window. In the registration confirmation you will also receive a link that allows you to test the technical requirements in advance.

Our webinars are generally free of charge.

The recordings and presentation slides will be available on the website shortly after the webinar. An email will be sent to all registered users. In order to access the materials, you will need to log in to your KuppingerCole User first.

Yes, the recordings and presentation slides are made available to all users that registered for the webinar, regardless if they attended live or were tied up with business. You do not need to deregister.

In some companies there are - mostly due to restrictive IT policies - problems with the installation. We regret this, of course, but cannot provide support in these cases. But no problem: You will receive the recording after the webinar, which you can watch in a normal web browser.