Building an Identity-Centric Security Strategy
Facebook Twitter LinkedIn

Building an Identity-Centric Security Strategy

Combined Session
Wednesday, May 11, 2022 14:30—15:30
Location: A03-04

Zero Trust and Software Supply Chain Security: Must-do’s for Every Organization

The risks of an insufficiently secured software supply chain have been known to industry experts for decades, but it took a series of high-profile attacks like Solarwinds or Log4Shell to bring them to the attention of much wider audiences. Now everyone finally seems to realize how catastrophic the consequences of such an attack could be, but still, many organizations are struggling to understand the scope of the security measures that are needed to prevent them from happening.

Zero Trust and Software Supply Chain Security: Must-do’s for Every Organization
Event Recording
Zero Trust and Software Supply Chain Security: Must-do’s for Every Organization
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Zero Trust and Software Supply Chain Security: Must-do’s for Every Organization
Presentation deck
Zero Trust and Software Supply Chain Security: Must-do’s for Every Organization
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Alexei Balaganski
Alexei Balaganski
KuppingerCole
Alexei is an analyst with specific focus on cybersecurity and Artificial Intelligence. At KuppingerCole, he covers a broad range of security-related topics: from database, application and API...

Experience is What Counts, Orchestration is How you Get There

The IAM space has grown immensely, with countless vendors emerging over recent years. Some of these offer a full suite of functions, which can cover many, if not most requirements organisations may have, whereas others offer niche or point solutions focusing on a single function, each with their own way of doing things.

Organisations often find themselves in a situation where they have to adapt their vision to what the products are capable of, sometimes needing to stitch together multiple products from different vendors and bridge the gaps through custom development. This may lead to a solution which is more home-grown than off-the-shelf, something fragile, inflexible, and hard to maintain, quite the opposite of current needs. Making changes to improve the user experience becomes a challenge, switching products or introducing new ones a major undertaking.

An alternative approach is to prioritise experience by focusing on a centralised orchestration conducting product functions so that consumers of identity services are served the right experience. This abstraction enables the flexibility and agility today's world requires, implementing the vision as it was white-boarded, custom tailoring the extraordinary experience(s) everyone is longing for. Changes can be made centrally, new functions and products can be introduced as necessary, all without having to make changes in each web application, mobile application or API.

Experience is what counts, orchestration is how you get there.

Experience is What Counts, Orchestration is How you Get There
Event Recording
Experience is What Counts, Orchestration is How you Get There
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Experience is What Counts, Orchestration is How you Get There
Presentation deck
Experience is What Counts, Orchestration is How you Get There
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Mehmet Yaliman
Mehmet Yaliman
Ping Identity
After studying Bioinformatics, Mehmet found himself as a developer, and shortly thereafter he changed his focus to the Identity space, where has been working for over a decade now, spending time in...

Reinventing the Network with Zero Trust to Stop External Network Attacks

In this talk we will cover:

Reinventing the Network with Zero Trust to Stop External Network Attacks
Event Recording
Reinventing the Network with Zero Trust to Stop External Network Attacks
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Reinventing the Network with Zero Trust to Stop External Network Attacks
Presentation deck
Reinventing the Network with Zero Trust to Stop External Network Attacks
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Philip Griffiths
Philip Griffiths
NetFoundry
Philip Griffiths is VP Global Business Development and regularly speaks at events from DevOps to IoT to Cyber Security. Prior to this, he worked for Atos IT Services in various roles working with...

Tickets

On-Demand Access
Re-live EIC 2022
€300
 
Watch 200 sessions on-demand
Download all available presentations
Subscribe for updates
Please provide your email address