Event Recording

Adaptive Protection for Identities

Show description
Speakers
Matthias Buchhorn-Roth
Data Space Architect
In Transition
Matthias Buchhorn-Roth
I am an accomplished data ecosystem expert, specializing in the development of sovereign data collaboration solutions across various industries. As an active member of the Eclipse DataSpace Components (EDC) Community, International DataSpace Association (IDSA), and Gaia-X, I am dedicated to...
View profile
Martina Vollmer
Cloud Solution Architect Engineering
Microsoft
Martina Vollmer
Martina Vollmer is a Cloud Solution Architect - Engineering for Identity and Power Platform at Microsoft, with combining security and automation with low/no code development. Her background in Computer Science and Management, combined with experience as an IT infrastructure architect at Siemens...
View profile
Top related content
Event Recording
How to Work Together in a Privacy Preserving Way to Mitigate Risks
Sep 19, 2017

Digital identity is central to all electronic transactions. Prevention of credential misuse is the first responsibility of identity management professionals today. Proper identity management includes identity vetting, issuance of credentials, risk-appropriate authentication and authorization, auditing, and more. Regulations such as GDPR also mandate that identity management systems must work to preserve the privacy of users. This session explores contemporary means of protecting identities to lower cyber risk while safeguarding the privacy of users.

Webinar Recording
The Foundation for GDPR Compliance and PI/PII Protection: Understand Where Data Resides and Who Processes It
Apr 03, 2019

The EU GDPR requires covered organizations to be able to account for and document how personal data is collected, processed and shared.  What many companies often fail to realize is that this data is not only stored in specialized and appropriately secured silos such as databases.  In fact, the vast majority of their business information is in unstructured and semi-structured formats, distributed across multiple systems an services. Without consistent visibility into whose data is processed across these environments, organizations cannot adequately account for how personal data is processed - as well as lose the context they need to identify security and compliance issues such as excessive privileges. To both address the compliance need for accountability and the security need for visibility, a new approach to data understanding is needed.

Event Recording
Eve Maler - User-Managed Identity and Access for the Digitally Transformative Enterprise
May 14, 2015

Self-determination, decisional autonomy, privacy enablement, and meaningful choice are not just tools for customer satisfaction: They’re also tools and characteristics for identity management in the enterprise that’s ready for digital transformation. How has user-managed identity and access shaped up so far, in terms of technology, processes, and adoption? And what progress can we expect in the decade to come? Join ForgeRock innovation VP Eve Maler to learn about the exciting ride we’ll all be on — one you’ll actually enjoy, because last we checked, enterprise IT experts are people too.

Event Recording
Digital Identity and Privacy: Stories from the Frontline
May 10, 2022

As the pace of digitalization gathers momentum, organizations are witnessing a dramatic increase in the number of digital identities. These identities interact with systems and applications relentlessly to perform day-to-day IT tasks. Nevertheless, maintaining the privacy of this data is a daunting task. Enterprise data is hosted in multi-tenant cloud, managed service providers and distributed data center environments. How an organization can maintain data privacy in this evolving IT access control use-cases depends on the level of preparedness to protect and monitor those digital identities. An identity and access management solution provides adequate safeguards to enforce IT practices necessary to maintain data privacy.

Event Recording
Identity, Privacy, Security - The European Perspective
Sep 13, 2021

In recent years, we have seen quite a few transatlantic policy issues with regards to Cybersecurity and the way how personal information is being treated by private and public organizations. The main areas where we see these differences are data protection/privacy, standards & certification and last but not least private-public information sharing.

Webinar Recording
Access Risk Management for SAP and Beyond
Jun 28, 2021

Organizations are increasingly under pressure to deliver security, identity, compliance, governance, and risk management for all types of business applications. This challenge is exacerbated by the fact that most organizations have a heterogeneous landscape of business applications both in terms of vendors and deployment models.

Webinar Recording
Dealing Effectively with Modern, Industrialized Cyber Threats
Jun 30, 2022

The cyber threat landscape has become very complex, with state-of-the-art intrusion, ransomware, and cryptocurrency mining tools now readily available through online stores and service providers, and an expanding attack surface due to increased cloud computing and remote working. Keeping data secure while ensuring its availability to legitimate users has become extremely challenging. Join experts from KuppingerCole Analysts and One Identity as they discuss the evolution of the cyber threat landscape and consider how correlating visibility, security, and control to an identity and its associated processes and accounts can significantly mitigate against modern cyber threats. 

The cybersecurity threat landscape continues to evolve and pose new challenges to CISOs and security managers. But as Paul Fisher, Lead Analyst at KuppingerCole will explain, it isn’t just about responding to threats, but also managing identity access and cloud infrastructures in new ways. Alan Radford, Global Identity and Access Management Strategist at One Identity will explain how to achieve a consistent view across users, machine identities, and accounts to help organizations move to a unified state. He will also highlight the importance of managing privileged users, and provide an overview of Unified Identity Management Platform that integrates Access Management, PAM, and IGA solutions.

Event Recording
How to Work Together in a Privacy Preserving Way to Mitigate Risks
Dec 21, 2017

Panel at the Consumer Identity World 2017 APAC in Singapore

Event Recording
Dealing with Multi-Cloud, Multi-Hybrid, Multi-Identity: Recommendations from the Field
May 11, 2022