Webinar Recording

Erfolgreiche IAM-Projekte: Von Best Practices Lernen

Show description
Speakers
Klaus Hild
Principal Identity Strategist
SailPoint Technologies
Klaus Hild
Bereits seit Ende der 90ziger Jahre begleitet Klaus Hild die ständigen Veränderungen im Identity- und Access Management-Umfeld mit. In verschiedenen Funktionen hat er zahlreiche Kundenprojekte initiiert, die Anforderungen in diesen Projekten beschrieben und sie gemeinsam mit dem...
View profile
Martin Kuppinger
Principal Analyst
KuppingerCole
Martin Kuppinger
Als Principal Analyst ist Martin Kuppinger verantwortlich für den Bereich KuppingerCole Research. In seiner 25-jährigen IT-Erfahrung hat er bereits mehr als 50 IT-Bücher geschrieben und ist ein etablierter Referent und Moderator bei Seminaren sowie Kongressen. Sein Interesse an...
View profile
Lead Sponsor
SailPoint
Playlist
KuppingerCole Webinars
Webinar Recording
The Business Value of Cloud-Based Identity Security
Mar 31, 2023

Join identity experts at KuppingerCole Analysts and SailPoint as they discuss the challenges of on-prem identity security solutions, the benefits of moving to software-as-a-service solutions, how to determine if that’s the right option, key questions to ask, how to quantify the financial impact, and how to choose the right solution.

Nitish Deshpande, Research Analyst at KuppingerCole Analysts, will look at the how legacy IGA systems can be modernized as part of digital transformation strategies. He will also share some tips and explain what needs to be taken into consideration when moving to the cloud to achieve future-proof identity security.

Chris Gossett Senior Vice President of Technology Services at SailPoint will explain the core benefits of upgrading to cloud-based identity security, the financial and business implications, and how to get started. He will also provide an overview of SailPoint’s approach to cloud-based identity security and SailPoint’s Identity Security Cloud Upgrade Program and Assessment for existing customers.

Webinar Recording
Schon perfekt vorbereitet für NIS2? Wenn nicht: warum Identity Governance so wichtig ist
Sep 06, 2023

Somit werden auch kleinere Unternehmen innerhalb von digitalisierten Lieferketten von NIS2 betroffen sein. Da eine Lieferkette immer nur so stark wie ihr schwächstes Glied ist, müssen sich alle Player innerhalb der Kette gegen die Risiken von Cyberangriffen schützen. Schlimmstenfalls kann sonst Industriespionage dazu führen, dass vertrauliche Informationen gestohlen, Produktionsanlagen gehackt oder der Informationsfluss und der Produktionsablauf gestört werden und so ganze Wirtschaftszweige lahmgelegt werden. Deshalb müssen Unternehmen jedweder Größe jetzt tätig werden und die Umsetzung der NIS2-Richtlinie einleiten.

KuppingerCole Principal Analyst Martin Kuppinger wird einleitend erklären, warum es NIS2 braucht und weshalb Organisationen sich frühzeitig damit auseinandersetzen und eine Identity-Roadmap erstellen sollten.

Klaus Hild, Principal Identity Strategist bei SailPoint, wird anhand von Beispielen darlegen, warum sich Unternehmen Gedanken über den „Lifecycle“ eines Mitarbeiters machen sollten, auch wenn dieser womöglich bereits das Unternehmen verlassen hat und wie Identity Governance and Administration (IGA) Lieferketten beeinflusst.

Abschließend wird Dr. Sven Hübner, Head of Consulting, Principal Consultant bei KOGIT GmbH, erläutern welche Relevanz NIS2 im Bereich der Lieferketten-Sicherheit hat und wie Projektkosten durch gezielte Planung kontrollierbar bleiben.

Webinar Recording
Perfecting Privileged Access Management (PAM)
Sep 15, 2023

Join security experts from KuppingerCole Analysts and Keeper Security as they look at user-friendly ways of increasing visibility, security, and control over employee passwords, credentials, and secrets. They will also discuss Privileged Account and Session Management (PASM), Secrets Management for DevOps, and other related topics.

Paul Fisher, Lead Analyst at KuppingerCole Analysts, will explore the dangers of not having visibility and control over user credentials on multiple devices, especially where the users involved have privileged access to data and services. He will also explain how to choose the right PAM solution.

Zane Bond, Head of Product Management at Keeper Security will explain how next-gen PAM platforms can provide the most critical components of PAM without the complexity of traditional solutions. He will also discuss the key capabilities of the KeeperPAM Platform, such as SSO integration, privileged credential management, credential vaulting, and session management, monitoring, and recording.

Webinar Recording
Harness IGA and GRC Synergies for Effective ID Management and Access Control
Sep 22, 2023

Join identity experts at KuppingerCole Analysts and Fastpath as they discuss the identity, access, and compliance challenges companies face, and examine how the convergence of Identity Governance and Administration (IGA) and Governance, Risk, and Compliance (GRC) can deliver a solution that enables businesses to anticipate and mitigate identity and access risks proactively.

Martin Kuppinger, Principal Analyst at KuppingerCole will talk about the fundamental functionalities of IGA solutions and the organizational activities they can support. He will also look what how the IGA market is likely to evolve and explain what needs to be taken into consideration when selecting an IGA solution.

Fastpath’s Mike Cassady, Chief Product Officer, and Matt Berdine, Sr. Director, Product and Solutions, will explore the synergy between IGA and GRC, and how implementing a best-of-breed IdentityGRC framework can streamline identity management and access control, while eliminating counterproductive silos and promoting collaborative focus on process and control ownership.

Webinar Recording
3rd Party Identity Risk – Der Feind Im Eigenen Haus (?)
Jun 14, 2023

Hierzu ist es unerlässlich, Identitätstypen nicht als voneinander getrennt agierende Entitäten, sondern als ineinander verwobene Fasern zu begreifen – die Identity Fabric. Erst durch diese Meta-Sicht kann eine zuverlässige Risikoabwägung erfolgen, die für den korrekten Umgang mit IoT-Identitäten grundlegend ist. Zuletzt ist die Reduktion von aufwändigen internen Prozessen und Kosten ein weiterer Faktor für die erfolgreiche Modernisierung des Identitätsmanagement in Ihrem Unternehmen.

In diesem Webinar lernen Sie:

  • Die wichtigsten Unterschiede zwischen verschiedenen Arten von Identitäten und ihren Zugriffsrechten kennen
  • Die Rolle der Lieferkette als schwächstes Glied im Zugriffsmanagement näher kennen
  • Wie Sie eine Vielzahl von Identitäten auch in externen Unternehmenseinheiten managen
  •  Wie ein sicherer Remote-Access für Menschen und Maschinen gewährleistet werden kann
Webinar Recording
Achieve Effective Risk and Vulnerability Management With a Platform Approach
Jun 16, 2023

Join security experts from KuppingerCole Analysts and Tanium as they discuss the common challenges faced in identifying, prioritizing, and remediating security vulnerabilities, and how to overcome them by adopting a proactive approach that will increase efficiency and reduce risk.

Richard Hill, Director of IAM Research and Lead Analyst at KuppingerCole, will discuss the value of Software Bill of Materials (SBOM), asset, and endpoint management. Also, how understanding the context of what you have can help surface software and endpoint vulnerabilities and compliance risks within an organization through visibility.

Bryant Bell, Director Product Marketing – Risk & Compliance at Tanium will outline a platform approach to identify, prioritize, and remediate vulnerabilities to achieve greater speed, scalability, and visibility to improve efficiency and reduce risk.

Webinar Recording
Mastering Global IAM for Cybersecurity Excellence: From Zero Trust Principles to Identity Threat Detection & Response (ITDR)
Dec 08, 2023

Join this webinar to learn more about

  • Complex Digital Transformations: As organizations transition to digital platforms and embrace cloud technologies, the webinar will provide insights into how to navigate the complexities of identity management for a safer and more efficient digital transformation.
  • Missing Holistic Security Concept: Learn how to seamlessly integrate SaaS services into your security landscape while safeguarding critical assets in the cloud.
  • Integration of Legacy Systems: Understand the challenges posed by legacy systems and discover strategies for their seamless integration with modern IAM solutions, eliminating potential security vulnerabilities.
  •  Decentralized Work Environments: With the rise of remote work, we'll discuss strategies for ensuring secure access to company resources from diverse locations and devices, enabling you to adapt to the changing work environment securely.
  • Zero Trust Implementation: While the Zero Trust model is widely advocated, it can be intricate to implement. We will provide insights into the fundamental shifts required in organizational security strategies to successfully implement the Zero Trust approach.

Paul Fisher, Lead Analyst at KuppingerCole Analysts, will look at the requirements and market for ITDR and the role it plays in the Zero Trust context, but also its relationship to other DR technologies.

Andre Priebe, Chief Technology Officer at iC Consult, will share his knowledge and experiences to help you enhance your cybersecurity strategy, tackle global challenges, and stay ahead in the ever-evolving world of cybersecurity.

Webinar Recording
The Anatomy of Insider Threats: Understanding the Risks in Financial Institutions
Nov 30, 2023

In this webinar, you will: 

  • Gain an understanding of insider threats and their implications for financial institutions. 
  • Win best practices for creating a robust insider threat program.
  • Discover how to manage privileged access, monitor subcontractors and terminal servers, meet compliance requirements, and audit user activities effectively.
  • Stay ahead of the curve in protecting your institution from internal threats that can have devastating consequences. 

Join us as Eugene Lymar, Chief Product Officer at Ekran System, and John Tolbert, Lead Analyst at KuppingerCole, share their knowledge, experience and best practices for strengthening your institution's defenses.

Webinar Recording
Why Network Detection & Response (NDR) Is Central to Modern Cyber Architecture
May 26, 2023

Join security and business experts from KuppingerCole Analysts and cyber technology firm Exeon Analytics as they discuss how these challenges can be met using machine learning supported and log data based Network Detection & Response solutions to improve the overall cyber security and resilience of organizations.

John Tolbert, Lead Analyst at KuppingerCole Analysts will look at reasons for deploying NDR, the various deployment models, and use cases for enterprise IT and OT environments. He will also explain how ML-enhanced detection algorithms increase confidence and reduce false positives, and discuss key requirements for choosing NDR solutions and how NDR fits into the XDR landscape.

Michael Tullius, Sales Director Germany at Exeon Analytics will discuss why NDR is necessary and how it can benefit security leaders, admins, and incident responders. He will also give examples of detectable use cases, provide an overview of Exeon’s NDR solution, and share recommendations for improving cyber resilience.

Webinar Recording
Speeding Up Zero Trust Delivery Using Managed Services
May 24, 2023

Join security experts from KuppingerCole Analysts and iC Consult as they discuss how to combine a Zero Trust security model with IAM Managed Services to achieve an optimal cybersecurity posture for ensuring that all IT networks and information systems are protected from cyber-attacks.

Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will talk about where, why, and how managed services can be utilized to speed up the Zero Trust journey. He will also highlight important requirements, including a high degree of standardization of services and the enforcement of Zero Trust principles such as "always verify".

Heiko Hütter, CEO of Service Layers, will share his perspectives on the benefits and challenges of Zero Trust and IAM Managed Services, give some real-world examples to show the benefits of a combined strategy, discuss how best to implement this strategy to reduce the risk of data breaches, and give an overview of iC Consult’s related expertise and services.

Webinar Recording
Identity Assurance Using Biometrics
Jul 21, 2023

Join identity experts at KuppingerCole Analysts and iProov to as they discuss the vulnerabilities of access control systems that rely on something that is known or possessed, and the value of adding biometrics. They will also discuss the role of biometrics in identity verification and proofing, and how to ensure biometrics are used safely to address privacy concerns.

Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the drivers of the growing demand for identity verification and identity proofing across a range of use cases from B2E to B2B and B2C, including the Work from Anywhere trend and Supply Chain Security/3rd Party Risk Management. He will also look at which signals can be used for identity proofing.

Joe Palmer Chief Product & Innovation Officer of iProov will explain how biometrics can improve security for digital and physical access. He will also provide guidance on aligning biometrics with high-risk changes in the identity lifecycle, inclusivity considerations, and mitigating the risk of generative AI in cyber-attack methodologies.

Webinar Recording
Digital Transformation in Financial Services Using Biometrics
Sep 20, 2023

Join identity experts at KuppingerCole Analysts and a global investment bank as they discuss new ways of complying with KYC (know your customer) and AML (anti money laundering) regulations in the Finance industry, while at the same time counteracting ever-evolving fraud schemes and improving the user experience.