Webinar Recording

GDPR as opportunity to build trusted relationships with consumers

Show description
Speakers
Dr. Karsten Kinast
Fellow Analyst
KuppingerCole
Dr. Karsten Kinast
Dr. Karsten Kinast, LL.M., Attorney at Law (Germany), is founding Partner of the Law Firm “Kinast & Partner” with an exclusive focus on Data Protection Law and IT-Law. He holds a Master of Laws Degree in European Legal Informatics and  serves as external Data Protection...
View profile
Martin Kuppinger
Principal Analyst
KuppingerCole
Martin Kuppinger
Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, a leading analyst company for identity focused information security, both in classical and in cloud environments. Prior to KuppingerCole, Martin wrote more than 50 IT-related books and is known  as a widely-read columnist...
View profile
Eve Maler
VP Innovation & Emerging Technology
ForgeRock
Eve Maler
Eve Maler (@xmlgrrl) is VP of Innovation & Emerging Technology in ForgeRock's Office of the CTO. She is a renowned strategist, innovator, and communicator on digital identity, security, privacy, and consent, with a focus on fostering successful ecosystems and individual empowerment. Eve...
View profile
Lead Sponsor
ForgeRock Deutschland GmbH
Playlist
KuppingerCole Webinars
Webinar Recording
Take Invisible MFA to the Next Level With Passwordless Continuous Authentication
Apr 21, 2023

Join experts from KuppingerCole Analysts and SecureAuth as they discuss why not all MFA solutions offer the same level of protection, and how organizations can improve their security posture and user experience by adopting a different approach that combines MFA with risk-based Passwordless Authentication.

Alejandro Leal, Research Analyst at KuppingerCole Analysts, will explore some of the problems with legacy MFA solutions and how a passwordless solution can improve usability and security. He will also explain some common passwordless features such as device trust and risk-based authentication.

Nawshad Hoossanbuksh, Senior Product Manager at SecureAuth will explain how adopting a passwordless continuous authentication approach can protect against phishing, brute-force, and MFA by-pass attacks such as MFA fatigue or MA bombing. He will also give an overview of SecureAuth’s Arculix passwordless continuous authentication solution.

Webinar Recording
The Business Value of Cloud-Based Identity Security
Mar 31, 2023

Join identity experts at KuppingerCole Analysts and SailPoint as they discuss the challenges of on-prem identity security solutions, the benefits of moving to software-as-a-service solutions, how to determine if that’s the right option, key questions to ask, how to quantify the financial impact, and how to choose the right solution.

Nitish Deshpande, Research Analyst at KuppingerCole Analysts, will look at the how legacy IGA systems can be modernized as part of digital transformation strategies. He will also share some tips and explain what needs to be taken into consideration when moving to the cloud to achieve future-proof identity security.

Chris Gossett Senior Vice President of Technology Services at SailPoint will explain the core benefits of upgrading to cloud-based identity security, the financial and business implications, and how to get started. He will also provide an overview of SailPoint’s approach to cloud-based identity security and SailPoint’s Identity Security Cloud Upgrade Program and Assessment for existing customers.

Webinar Recording
Implementing Zero Trust With Privileged Access Management Platforms
Dec 16, 2022

Among the many approaches to do that, Zero Trust is one where organizations apply the principle of “never trust – always verify”. Since Zero Trust is not a single product or solution, implementing processes that work accordingly can be a challenge to IT teams that want to keep their privileged accounts safe. Modern Privileged Access Management (PAM) platforms can help with these challenges.

Paul Fisher, Lead Analyst at KuppingerCole will look at why standing privileges are a risk to modern multi-cloud and hybrid architectures and how Zero Trust can help in reducing standing privileges. Moreover, he will explain why advanced PAM platforms can assist with establishing a Zero Trust posture and how to move PAM to decentralized operations.

Joe Burke, Chief Architect, PAM, in the Symantec Identity Security Group, proposes organizations should rethink how to implement Zero Trust security for secrets, privileges, and privileged accounts. He will elaborate on factors that IT decision-makers should look for in Zero Trust-enabling PAM solutions. Among these are the time to implement, low operational overhead, scalability and performance, ecosystem integrability, as well as coarse and fine-grained authorization enforcement.

Webinar Recording
Effective Application Access Controls in the Modern Business IT Landscape
Jul 19, 2023

Join security experts from KuppingerCole Analysts and Pathlock as they discuss why modern applications need more granular and context-based access controls, why it is important that these controls can adapt to changing business needs and user behaviors, and how that can be achieved.

Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will provide a head-to-head comparison of key features of common, traditional IGA, and the established access control tools for SAP and other Line of Business (LoB) applications.

Carrie Curry, VP of Customer Advisory at Pathlock will explain the benefits of a holistic application access management approach that can provide real-time access decisions based on contextual data, that can support compliance, that provides fine-grained controls, and that can reduce the cost and effort of access reviews. She will also discuss why organisations need to have a cross-system and application view when it comes to Access Governance.

Webinar Recording
Speeding Up Zero Trust Delivery Using Managed Services
May 24, 2023

Join security experts from KuppingerCole Analysts and iC Consult as they discuss how to combine a Zero Trust security model with IAM Managed Services to achieve an optimal cybersecurity posture for ensuring that all IT networks and information systems are protected from cyber-attacks.

Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will talk about where, why, and how managed services can be utilized to speed up the Zero Trust journey. He will also highlight important requirements, including a high degree of standardization of services and the enforcement of Zero Trust principles such as "always verify".

Heiko Hütter, CEO of Service Layers, will share his perspectives on the benefits and challenges of Zero Trust and IAM Managed Services, give some real-world examples to show the benefits of a combined strategy, discuss how best to implement this strategy to reduce the risk of data breaches, and give an overview of iC Consult’s related expertise and services.

Webinar Recording
The Anatomy of Insider Threats: Understanding the Risks in Financial Institutions
Nov 30, 2023

In this webinar, you will: 

  • Gain an understanding of insider threats and their implications for financial institutions. 
  • Win best practices for creating a robust insider threat program.
  • Discover how to manage privileged access, monitor subcontractors and terminal servers, meet compliance requirements, and audit user activities effectively.
  • Stay ahead of the curve in protecting your institution from internal threats that can have devastating consequences. 

Join us as Eugene Lymar, Chief Product Officer at Ekran System, and John Tolbert, Lead Analyst at KuppingerCole, share their knowledge, experience and best practices for strengthening your institution's defenses.

Webinar Recording
Navigating the Access Control Maze
Dec 06, 2023

This KuppingerCole webinar offers a comprehensive exploration of access control challenges, the limitations of traditional RBAC and PBAC, some innovative policy-driven solutions, a demonstration of policy-driven RBAC in MidPoint, and actionable insights for enhancing access control strategies.

Join experts from KuppingerCole Analysts AG and Evolveum to unravel the complexities of modern access control and explore the challenges faced by organizations striving to protect their digital assets.

Paul Fisher, Lead Analyst at KuppingerCole Analysts, will look at the concept of the “access control zoo” and talk about why numerous methods exist. He will also outline why some organizations stick with flawed models like RBAC, and how adopting improved access controls can enhance identity and access management within businesses.

Radovan Semancik, Co-Founder and Software Architect at Evolveum will present a bottom-up approach and explain how midPoint's dynamic policy-driven RBAC addresses these challenges effectively.

Webinar Recording
Schon perfekt vorbereitet für NIS2? Wenn nicht: warum Identity Governance so wichtig ist
Sep 06, 2023

Somit werden auch kleinere Unternehmen innerhalb von digitalisierten Lieferketten von NIS2 betroffen sein. Da eine Lieferkette immer nur so stark wie ihr schwächstes Glied ist, müssen sich alle Player innerhalb der Kette gegen die Risiken von Cyberangriffen schützen. Schlimmstenfalls kann sonst Industriespionage dazu führen, dass vertrauliche Informationen gestohlen, Produktionsanlagen gehackt oder der Informationsfluss und der Produktionsablauf gestört werden und so ganze Wirtschaftszweige lahmgelegt werden. Deshalb müssen Unternehmen jedweder Größe jetzt tätig werden und die Umsetzung der NIS2-Richtlinie einleiten.

KuppingerCole Principal Analyst Martin Kuppinger wird einleitend erklären, warum es NIS2 braucht und weshalb Organisationen sich frühzeitig damit auseinandersetzen und eine Identity-Roadmap erstellen sollten.

Klaus Hild, Principal Identity Strategist bei SailPoint, wird anhand von Beispielen darlegen, warum sich Unternehmen Gedanken über den „Lifecycle“ eines Mitarbeiters machen sollten, auch wenn dieser womöglich bereits das Unternehmen verlassen hat und wie Identity Governance and Administration (IGA) Lieferketten beeinflusst.

Abschließend wird Dr. Sven Hübner, Head of Consulting, Principal Consultant bei KOGIT GmbH, erläutern welche Relevanz NIS2 im Bereich der Lieferketten-Sicherheit hat und wie Projektkosten durch gezielte Planung kontrollierbar bleiben.

Webinar Recording
Championing Privileged Access Management With Zero Trust Security
Jan 20, 2023

A modern approach to securing privileged accounts is to apply the principle of Zero Trust: Never trust, always verify. While Zero Trust is not an off-the-shelf solution, it is modern vendors of PAM solutions that recommend using this security principle to cement the technical capabilities of their products. This webinar will provide actionable insights for organizations to employ Zero Trust security in their overall PAM strategy and operations.

Paul Fisher, Senior Analyst at KuppingerCole, will look at the origins of Zero Trust theory and its development as well as how Zero Trust fits into the KuppingerCole identity and cybersecurity fabric architecture concepts. He will address how Zero Trust can assist in managing cloud entitlements and discuss we 100% Zero Trust is possible. Srilekha Sankaran, product consultant for PAM solutions at ManageEngine, will address the risks of insider threats and privilege misuse in the era of hybrid work, and discuss the management and elimination of the risks posed by standing privileges.

Webinar Recording
Shut the Door to Cyber Attackers Permanently
Jul 26, 2023

Join security experts from KuppingerCole Analysts and Beyond Identity as they discuss the challenges of first-generation MFA and how to reduce friction while increasing security and improving the user experience by implementing passwordless authentication within a Zero Trust security framework.

Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will present a matrix that helps organizations to prioritize their Zero Trust efforts, mapped to the key building blocks of a comprehensive Zero Trust strategy.

Patrick McBride, Chief Marketing Officer at Beyond Identity will explain how organizations can eliminate passwords and friction within a Zero Trust framework. He will also provide an overview of Beyond Identity’s Zero Trust Authentication solution.

Webinar Recording
Welcome to the Pamocracy!
Apr 19, 2023

In this webinar Lead Analyst and PAM specialist Paul Fisher will guide you through how this shift has happened, what it means for you organization, and how you can benefit from the Pamocracy. He will also explain how Privileged Access Management vendors and cloud providers have adapted to this new paradigm through innovation and addressing new market needs. It is a fascinating area of identity management that no business can afford to ignore.

As part of this webinar, Paul will introduce KC Open Select. The new online tool from KuppingerCole that helps buyers choose the right IT solutions, and how this will help you in choosing the best PAM solution.

Webinar Recording
Best of Both Worlds: Combining Multi-Factor and Passwordless Authentication
Mar 24, 2023

Join experts from KuppingerCole Analysts and trusted identity firm Entrust as they discuss why not all MFA solutions offer the same level of protection. They will also explore the current state of Passwordless Authentication solutions and how best to implement them.

Alejandro Leal, Research Analyst at KuppingerCole will discuss how business IT is changing, and the implications for passwords. He will also explain why and how passwords need to be eliminated to increase security, regulatory compliance, and user satisfaction.

Rohan Ramesh, Director of Product Marketing: Identity and Access Management at Entrust will describe the various MFA-based attacks being seen in the wild and how to combine MFA and Passwordless Authentication to enable secure access for users and improve overall security.