Event Recording

Panel | A First-Person Account of Third-Party Identity Risk Management

Show description
Speakers
Dr. Martin Kuhlmann
Vice President, Global Presales
Omada
Dr. Martin Kuhlmann
Dr. Martin Kuhlmann heads up the Global Presales Team at Omada. In this position and formerly as Senior Solution Architect, he has been advising strategic customers and designing Identity & Access Management solutions. Martin has been active in the IT Security space for more than two decades...
View profile
David Pignolet
President & CEO
SecZetta
David Pignolet
With nearly two decades of experience in application, network, and data security, David Pignolet founded SecZetta in 2006, assembling a highly-experienced team and securing strategic partnerships to address a growing need for better IT security and identity and access management in...
View profile
Fabian Süß
Project Manager
KuppingerCole
Fabian Süß
Fabian joined KuppingerCole‘s Events Team in July 2021 as a Project Manager, with a focus in Content and Agenda for the Cybersecurity Leadership Summit. He holds both a M. Eng. in Construction and Real Estate from the University of Applied Sciences Augsburg and an EMBA in Digital...
View profile
Top related content
Webinar Recording
Finding Your Path to Zero Trust
May 20, 2021

As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.

Interview
The Interplay between Zero Trust and IAM
Nov 18, 2020

Martin Kuppinger and Danna Bethlehem, Director of Product Marketing at Thales discuss their perspectives on the interplay of Zero Trust and Identity and Access Management.

Interview
Continual Access Control, Policies and Zero Trust
Jan 04, 2023

Trust no one, always verify. We know that Zero Trust phrase already. But this principle is rather abstract - how and where exactly should we do that? Martin sits down with Jackson Shaw, Chief Strategy Officer at Clear Skye to discuss one very important part of Zero Trust: Identity and Access Management. Because you can only verify what or who you know - they need an identity to get access.

Event Recording
Panel | Prioritizing Identity - Identity-Centric Security Strategy
Sep 14, 2021

Identity management is critical for digital transformation and continues to evolve and gain importance as the business environment changes in today's hyperconnected world, where employees, business partners, devices, and things are all tightly interwoven. Deploying an identity security solution – regardless of your business size or industry is a fundamental requirement today to facilitate secure communications and reliable transactions.

This panel explores identity security strategies that enable your business to take full advantage of your solution’s capabilities.

Yvo van Doorn, Senior Solutions Engineer, Auth0
Oliver Krebs, GM EMEA, Onfido
Martin Kuppinger, Principal Analyst, KuppingerCole
Webinar Recording
In an Age of Digital Transformation Managing Vendor and Partner Identity Is Critical
Sep 18, 2020

Organizations have been managing the identity and access of employees for many years to protect data and the overall security of the enterprise. However, the onset of digital transformation has driven a need for faster, cost-effective innovation and with it the increased utilization of third-party resources. Consequently, organizations have a greater need to manage third-party access to data, systems, and facilities. This includes contractors, vendors but also partners, affiliates, volunteers, and even service accounts and bots. Modern organizations are much more collaborative and open structures than those of even just a few years ago and continue to change.

Webinar Recording
Trust No One: Zero Trust Strategy and Design
Aug 25, 2021

With workloads moving to the cloud and remote working increasing, traditional perimeter-based security strategies are no longer practical. A Zero Trust model of strict access control for every user or device offers an alternative that secures data while ensuring it is accessible to those who need it. But the shift to treating both internal and external users as untrusted can be challenging.

Event Recording
Panel: The Future of Access Management
Jul 22, 2021
Webinar Recording
Zero Trust: Solving IT Security’s Identity Crisis
May 04, 2018

Although companies are constantly increasing their cybersecurity budgets, this does not seem to help much: each day we learn about new large-scale data breaches. Considering that over 80% of hacking-related breaches leverage compromised user credentials, it’s mindboggling why so many organizations are still focusing on securing their network perimeters.

Event Recording
Expert Chat: Interview with Francois Lasnier
May 27, 2021