Webinar Recording

2020 Is the Year of the Identity Management Revolution

Show description
Speakers
Danna Bethlehem
Director Product Marketing IAM
Thales Cloud Protection & Licensing
Danna Bethlehem
With more than 10 years’ experience in product leadership roles, Danna Bethlehem currently leads product marketing for Thales’s authentication and access management solutions. Prior to joining Thales, Danna held product leadership positions in several startups ranging from financial...
View profile
Dirk Geeraerts
VP Sales EMEA IAM
Thales Cloud Protection & Licensing
Dirk Geeraerts
With over 15 years of experience in the field of data security, Dirk Geeraerts has a broad range of experience in the industry across multiple regions and organisation types. As VP Sales EMEA IAM, he plays a key role in managing customer and partner relationships across the region. Thanks to his...
View profile
Martin Kuppinger
Principal Analyst
KuppingerCole
Martin Kuppinger
Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, a leading analyst company for identity focused information security, both in classical and in cloud environments. Prior to KuppingerCole, Martin wrote more than 50 IT-related books and is known  as a widely-read columnist...
View profile
Lead Sponsor
Thales
Top related content
Webinar Recording
Solving New Authentication Challenges While Finding Parity Between User Experience and Security
Jan 16, 2019

In an increasingly hostile world, where you don't know who to trust, companies still need to be able to deliver trusted, personalized experiences for users, without making them jump through hoops to prove who they are.

Webinar Recording
Zero Trust Through Identity-Based Segmentation
Jul 21, 2021

As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict identity verification and access control for every user or workload offers an alternative that secures data while ensuring it is accessible to those who need it.

Webinar Recording
Finding Your Path to Zero Trust
May 20, 2021

As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.

Event Recording
Identity as the Key to Zero Trust Maturity
Mar 23, 2022

Okta’s vision is to enable everyone to safely use any technology. Trust is critical to our business and our customers' success. Markus Grüneberg will speak about the modern digital identity and how to use them to build a robust security strategy. In this keynote he will present among maturity stages Okta's role model for Zero Trust. 

Webinar Recording
Zero Trust: Solving IT Security’s Identity Crisis
May 04, 2018

Although companies are constantly increasing their cybersecurity budgets, this does not seem to help much: each day we learn about new large-scale data breaches. Considering that over 80% of hacking-related breaches leverage compromised user credentials, it’s mindboggling why so many organizations are still focusing on securing their network perimeters.

Webinar Recording
Making Zero Trust Work With the NIST Framework
Dec 17, 2020

There’s lots of hype around Zero Trust Security in the context of our changing mobile and cloud-centric working environments. Moving towards a modern and agile Zero Trust security concept is essential in today's mobile first, work-securely-from-anywhere world.

Webinar Recording
In an Age of Digital Transformation Managing Vendor and Partner Identity Is Critical
Sep 18, 2020

Organizations have been managing the identity and access of employees for many years to protect data and the overall security of the enterprise. However, the onset of digital transformation has driven a need for faster, cost-effective innovation and with it the increased utilization of third-party resources. Consequently, organizations have a greater need to manage third-party access to data, systems, and facilities. This includes contractors, vendors but also partners, affiliates, volunteers, and even service accounts and bots. Modern organizations are much more collaborative and open structures than those of even just a few years ago and continue to change.

Event Recording
The Dawn of Digital IAM
Sep 13, 2021

Join Vadim Lander, Symantec Identity Management Security Chief Architect and CTO, Broadcom as he discusses the new realities that are driving the evolution of Identity and Access Management (IAM) and how organizations use IAM as a key pillar in the architecture for Zero Trust. Vadim will also highlight the future of the Symantec’s IAM suite of solutions and how they will help our customers build their own Identity Fabric.  

Interview
The Interplay between Zero Trust and IAM
Nov 18, 2020

Martin Kuppinger and Danna Bethlehem, Director of Product Marketing at Thales discuss their perspectives on the interplay of Zero Trust and Identity and Access Management.