Webinar Recording

How to Stop the Insider Threat: Protect Yourself from Privileged Users

by Martin Kuppinger
Show description
Speakers
Jonathan Cogley
CEO
Thycotic Software
Jonathan Cogley
Jonathan grew up in South Africa and began his software engineering career in London where he founded Thycotic Software Ltd in 1996, moving Thycotic headquarters to the United States several years later. Thycotic is recognized as the fastest growing private company in identity and access...
View profile
Martin Kuppinger
Principal Analyst
KuppingerCole
Martin Kuppinger
Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, a leading analyst company for identity focused information security, both in classical and in cloud environments. Prior to KuppingerCole, Martin wrote more than 50 IT-related books and is known  as a widely-read columnist...
View profile
Ben Yoder
Product Manager
Thycotic Software
Ben Yoder
Ben Yoder is a software engineer turned product manager and a lover of all things IT. He’s an expert on technology integrations and database systems, manages Thycotic Software’s market-leading Privileged Account Management solution, and keeps a keen eye on product trends in the IT...
View profile
Lead Sponsor
Delinea
Playlist
KuppingerCole Webinars
Webinar Recording
Access Governance für SAP-Systeme – Direkt aus dem IGA-System
SAP-Systeme sind zentrale Komponenten der Business-Anwendungen in vielen Unternehmen. Mit der vermehrten Nutzung von anderen Cloud-Lösungen für Teile der Geschäftsprozesse sind sie aber längst nicht mehr die einzigen Lösungen, in denen kritische Informationen gehalten werden. Damit stellt sich immer mehr die Frage, welche Systeme die Zugriffskontrolle und Risikoanalyse für SAP übernehmen. IGA-Lösungen können hier eine zentrale Funktion übernehmen, um Audit- und Sicherheitsanforderungen effizient und integriert umzusetzen.
Webinar Recording
The Future of Privileged Access Management
PAM is an established and essential discipline within IAM. Traditional PAM is primarily focused on securing privileged access, for instance of administrators, to servers and systems. In today’s dynamic IT environments, the need for just-in-time access and for supporting agile workloads in IaaS environments is growing. PAM must support these emerging needs. There also is a growing need for integration with other areas of IAM such as Access Management solutions.
Webinar Recording
Breaking the Ransomware Attack Chain
At some point, any business connected to the internet is likely to become a victim of a ransomware because they are relatively easy and inexpensive to carry out, but potentially yield large payouts for cybercriminals. The best way of tackling this threat is to know how to break the attack chain.
Webinar Recording
An Agile Approach to Customer Identity and Access Management (CIAM)
Business success in the digital era depends on delivering seamless and secure customer experiences. Failure to do so can easily result in abandoned shopping carts, fraudulent transactions, and regulatory fines. However, delivering exceptional experiences and keeping pace with the speed of business is challenging.
Webinar Recording
Implementing Zero Trust With Privileged Access Management Platforms
There is no debate about the fact that ransomware is the fastest-growing kind of cybercrime. Due to their wide range of access rights and thus potential ransom leverage, privileged accounts are at the top of the target list for cybercriminals. Therefore, organizations need to pay special attention to securing these kinds of accounts.
Webinar Recording
Better Business With Smooth and Secure Onboarding Processes
In the modern world of working, organizations need to digitally verify and secure identities at scale. But traditional IAM and CIAM strategies can’t identity-proof people in a meaningful way in the digital era. Finding an automated digital identity proofing system that is passwordless and provides strong authentication, is essential.
Webinar Recording
Don’t Delay, Get Ready for a New Digital World Today
Like many other countries, digitization is a strategic priority in Germany, where there is a concerted effort to digitize public services. German banks and insurance companies are also digitalizing their customer journeys. Other organizations need to do the same, or risk losing competitive advantage in the digital era.
Webinar Recording
Effective Identity Access Governance in Hybrid SAP Environments
Increased cyber threats and regulatory requirements for privacy and security make staying on top of user roles and access rights in hybrid IT environments more important and challenging than ever, which means it’s important to understand the real risks and how to mitigate them effectively with modern GRC capabilities.
Webinar Recording
Making Zero Trust a Reality: Basing Decisions on Valid Identity Data
Cloud computing and mobile workforces have resulted in an expanding attack surface and a complex web of identify information. This means that traditional perimeter-based security models are no longer effective. A Zero Trust model of strict access control for every user and device enables businesses to be connected and secure, but an effective identity-focused approach is essential.
Webinar Recording
Understanding the Privacy Evolution to Get Ahead of the Curve
In the age of big data, AI, multi-cloud and hybrid IT environments, and ever closer links between customers, third parties and organizations, businesses need to think more carefully about privacy. But this can be challenging, with rapidly evolving technology and increased regulatory complexity.