Event Recording

Entitlements - Claim vs. Reality

Show description
Michael Breier
Vice President Systems Engineering – Security & Compliance
Cygna Labs
Michael Breier
Michael has 25+ years of experience in different IT management areas such as System-, Network-, Least Privilege- and Privileged Access Management as well as Active Directory and Cloud Security & Compliance. He’s leading a global team of consultants covering the entire technical project...
View profile
Ina Schäfer
Marketing & Product Expert
Ina Schäfer
Ina Schäfer is a valuable asset to the N3K/Cygna Group, bringing with her over 17 years of experience in brand awareness and marketing. She is highly respected by both clients and employees for her extensive product knowledge and expertise. Ina's proficiency in both traditional and digital...
View profile
Top related content
Webinar Recording
Identity Security: A Top Priority for the Modern Enterprise
Dec 15, 2021

Accelerated digital transformation has led to an explosion of digital identities, which means any user can have some level of privileged access at some time. Cyber attackers are targeting this rapidly expanding attack surface. This means identity security, has never been more important or challenging.

Webinar Recording
Ground Control to Major CRO: Is Identity Governance a Risky Experience?
Jun 03, 2015
In today’s fast changing world the digitalization of businesses is essential to keep pace. The new ABC – Agile Businesses Connected – is the new paradigm organizations must follow. They must connect to their customers, partners and associates. They must become agile to respond to the changing needs of the market. They must understand, manage, and mitigate the risks in this connected world. One important aspect of this is the governance of the ever-increasing number of identities – customers, things, together with their access.
Webinar Recording
Can't see the wood from the trees?
Jun 25, 2014

KuppingerCole Webinar recording

Webinar Recording
State-of-the-Art Privilege Management by Design
Oct 07, 2016

Privilege Management needs to be injected into the DNA of any IT infrastructure, it must not merely be understood as a point solution for some critical access. An adequate management of shared accounts is still a vital foundation layer for Privilege Management. Controlling applications on servers and workstation alike gets more and more important. Applying a risk-based approach for controlling critical access helps putting the focus on sensitive privileges. And understanding typical admin behaviour as well as identifying undesirable actions can assist you in adapting your Privilege Management strategy as threat patterns change.

Webinar Recording
Multi-Cloud Permissions Management
Jul 27, 2022

Most businesses are adopting cloud services from multiple providers to remain flexible, agile, efficient, and competitive, but many do not have enterprise-wide control over and visibility of tens of thousands of cloud access permissions, exposing the enterprise to risk of security breaches.

Webinar Recording
Harness IGA and GRC Synergies for Effective ID Management and Access Control
Sep 22, 2023

Join identity experts at KuppingerCole Analysts and Fastpath as they discuss the identity, access, and compliance challenges companies face, and examine how the convergence of Identity Governance and Administration (IGA) and Governance, Risk, and Compliance (GRC) can deliver a solution that enables businesses to anticipate and mitigate identity and access risks proactively.

Martin Kuppinger, Principal Analyst at KuppingerCole will talk about the fundamental functionalities of IGA solutions and the organizational activities they can support. He will also look what how the IGA market is likely to evolve and explain what needs to be taken into consideration when selecting an IGA solution.

Fastpath’s Mike Cassady, Chief Product Officer, and Matt Berdine, Sr. Director, Product and Solutions, will explore the synergy between IGA and GRC, and how implementing a best-of-breed IdentityGRC framework can streamline identity management and access control, while eliminating counterproductive silos and promoting collaborative focus on process and control ownership.

Speaker Spotlight
EIC Speaker Spotlight: Patrick Parker
Jul 08, 2021
Event Recording
Building the Roadmap for Your Future IAM | Workshop
May 09, 2023
Event Recording
Trust No One, Always Verify
May 11, 2023

Cybercriminals no longer “hack” in – they simply log in. Once inside, they hunt for privileged accounts. A vast majority of breaches today are due to the abuse of stolen privileged accounts. Privileged accounts are very powerful but at times, anonymous and shared. Learn how to take control of Privileged Access to ensure that your most valuable asset - your data - is protected.