Webinar Recording

Clearing up a Cloudy Standard: Simple Cloud Identity Management

by Dave Kearns
Show description
Speakers
Patrick Harding
CTO
Ping Identity
Patrick Harding
Patrick Harding is the Chief Technology Officer of Ping Identity, responsible for Ping Identity Labs, emerging technologies, architecture and standards, and developing the technology strategy for the company. Previously, Harding was a VP and the Security Architect (Enterprise Architect Division)...
View profile
Dave Kearns
Senior Analyst
KuppingerCole
Dave Kearns
Dave spent 10 years as a network manager, ending up as Information Services Manager for the former Thomas-Conrad Corporation (now part of Compaq ). In 1987, he was a founding SysOp of Novell's Novell Support Connection service on Compuserve and served as the first president of the Association...
View profile
Darran Rolls
CTO & CISO
SailPoint
Darran Rolls
Mr. Darran Rolls is the Chief Technology Officer and Chief Information Security Officer and at SailPoint, where he is responsible for directing the company’s technology strategy and security operations.  Mr. Rolls has a long history in identity management and security at companies...
View profile
Playlist
KuppingerCole Webinars
Webinar Recording
A Zero Trust Approach to Cyber Resilience
Security in many organizations is not evolving fast enough to keep up with business transformation, including migration to the cloud and to Industry 4.0. These changes, while essential to remain competitive, bring fresh security risks. A new approach is needed to ensure cyber resilience.
Webinar Recording
Managing Cyber Risk in a Hybrid Multi-Cloud IT Environment
Today’s IT environments blend applications and services from multiple public cloud networks, private clouds and on-prem networks, making it difficult to view and inventory assets deployed across complex hybrid networks, and keep track of the security risks. Organizations need to find a way to improve visibility, identify and prioritize risks, and maintain cyber resiliency.
Webinar Recording
The Future of Privileged Access Management
PAM is an established and essential discipline within IAM. Traditional PAM is primarily focused on securing privileged access, for instance of administrators, to servers and systems. In today’s dynamic IT environments, the need for just-in-time access and for supporting agile workloads in IaaS environments is growing. PAM must support these emerging needs. There also is a growing need for integration with other areas of IAM such as Access Management solutions.
Webinar Recording
Effective Cyber Risk Quantification Through Automation
Continual high-profile cyber incidents demonstrate beyond a doubt that cyber risks exist, but most organizations struggle to quantify cyber risk in a useful way. There is an urgent need for IT security leaders to find a common way to express cyber risk in monetary terms, that business leaders understand to enable effective risk management and security investment.
Webinar Recording
Why Architects Should Rethink Authorizations
In the digital era, organizations are increasingly interacting online with contractors, partners, and customers. Traditional role-based authorization frameworks are not designed to provide these external identities with the right access to resources, services, and apps. A new approach is required.
Webinar Recording
Urgent: Find and Block Identity-Centric Security Threats Today
The inability to deal with identity-centric cyber threats is one of the most critical issues facing modern enterprises. Attackers are increasingly targeting digital identities to gain unauthorized access to systems and data. Action is essential, but detecting unauthorized access is challenging.
Webinar Recording
Understanding the Privacy Evolution to Get Ahead of the Curve
In the age of big data, AI, multi-cloud and hybrid IT environments, and ever closer links between customers, third parties and organizations, businesses need to think more carefully about privacy. But this can be challenging, with rapidly evolving technology and increased regulatory complexity.
Webinar Recording
Fixing the Way the World Logs In
Passwords are quickly and easily compromised, they are costly and difficult to manage, and they result in poor user experiences. Many organizations are looking for alternatives, but find it challenging to identify appropriate passwordless and phishing resistant authentication solutions that are simple, effective, and secure.
Webinar Recording
Policy Based Access Control for Cloud-Native Applications
As companies shift to cloud-native applications, the complexity of a microservices framework can be daunting. When applications are built in a cloud-native stack, authorization is also infinitely more complex. Crucially, Open Policy Agent (OPA) decouples policy from code, enabling the release, analysis, and review of policies without impacting availability or performance.
Webinar Recording
The Changing Scope of the NIS 2 EU Directive
The NIS Directive aimed at achieving a common standard of network and information security across all EU Member States, with a focus on operators of essential services, is scheduled for an update. Suppliers of utilities, healthcare, transport, communications, and other services need to know what changes are coming and what they need to do to comply.