Webinar Recording

Trust No One: Zero Trust Strategy and Design

Show description
Speakers
Anshuman Goswami
Associate Vice President
Persistent Systems
Anshuman Goswami
Anshuman Goswami is Associate Vice President – Security services at Persistent Systems. He has 20+ years of experience delivering successful Cybersecurity solutions across leading organizations in FTSE 100 and Fortune 500 organizations. He has extensive knowledge and expertise in IAM,...
View profile
Martin Kuppinger
Principal Analyst
KuppingerCole
Martin Kuppinger
Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, a leading analyst company for identity focused information security, both in classical and in cloud environments. Prior to KuppingerCole, Martin wrote more than 50 IT-related books and is known  as a widely-read columnist...
View profile
Milan Patel
Product Manager
IBM
Milan Patel
Milan Patel is a product manager at IBM focused on delivering client value enabled by cloud, blockchain, and security technologies. He is currently focused on IBM Security Verify, a cloud native Identity as a Service to help organizations modernize workforce and consumer experiences with robust...
View profile
Lead Sponsor
Persistent Systems
Playlist
KuppingerCole Webinars
Webinar Recording
Digital Transformation in Financial Services Using Biometrics
Sep 20, 2023

Join identity experts at KuppingerCole Analysts and a global investment bank as they discuss new ways of complying with KYC (know your customer) and AML (anti money laundering) regulations in the Finance industry, while at the same time counteracting ever-evolving fraud schemes and improving the user experience.

Webinar Recording
Best of Both Worlds: Combining Multi-Factor and Passwordless Authentication
Mar 24, 2023

Join experts from KuppingerCole Analysts and trusted identity firm Entrust as they discuss why not all MFA solutions offer the same level of protection. They will also explore the current state of Passwordless Authentication solutions and how best to implement them.

Alejandro Leal, Research Analyst at KuppingerCole will discuss how business IT is changing, and the implications for passwords. He will also explain why and how passwords need to be eliminated to increase security, regulatory compliance, and user satisfaction.

Rohan Ramesh, Director of Product Marketing: Identity and Access Management at Entrust will describe the various MFA-based attacks being seen in the wild and how to combine MFA and Passwordless Authentication to enable secure access for users and improve overall security.

Webinar Recording
Evolving Identity and Access Management for the Digital Era
Jan 18, 2023

Join Identity & Access Management experts from KuppingerCole Analysts and Broadcom as they discuss how business IT is changing, and the implications for IAM. They will define modern IAM and explain why and how IAM needs to change to support modern app development, regulatory compliance, and user satisfaction.

Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the evolution of the concept of Identity Fabrics, its guiding principles, how to approach IAM investments, and how KuppingerCole expects Identity Fabrics to evolve over the next few years. Vadim Lander, Identity Security CTO & Distinguished Engineer in the Symantec Identity Security Group will explain how organizations can transition their IAM capabilities to support modern business IT environments without a radical rip and replace approach. He will also provide insights into how to make your IAM performant, scalable, extensible, manageable, and interoperable.

Webinar Recording
Beyond Just SAP: The Need for Cross-LoB Access Controls
Sep 07, 2023

In this webinar, you’ll learn about

  • The changing landscape of LoB applications and how to tackle the access-related challenges
  • Requirements on modern solutions for access control for SAP and for hybrid multi-vendor environments
  • A market leadership view: The KuppingerCole Leadership Compasses for access control tools
  • Implementing a multi-vendor, hybrid approach for access control for LoB applications

Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the state of the market, the requirements on solutions, and will present selected results from the recent KuppingerCole Leadership Compasses covering this market segment for both SAP-specific and multi-vendor LoB environments.

Keri Bowman, Sr. Director Product Marketing, at Pathlock, then will explain how the Pathlock solutions support customers in managing access controls, access risk, and SoD rules across multiple LoB applications from different vendors from a unified interface.

Webinar Recording
Perfecting Privileged Access Management (PAM)
Sep 15, 2023

Join security experts from KuppingerCole Analysts and Keeper Security as they look at user-friendly ways of increasing visibility, security, and control over employee passwords, credentials, and secrets. They will also discuss Privileged Account and Session Management (PASM), Secrets Management for DevOps, and other related topics.

Paul Fisher, Lead Analyst at KuppingerCole Analysts, will explore the dangers of not having visibility and control over user credentials on multiple devices, especially where the users involved have privileged access to data and services. He will also explain how to choose the right PAM solution.

Zane Bond, Head of Product Management at Keeper Security will explain how next-gen PAM platforms can provide the most critical components of PAM without the complexity of traditional solutions. He will also discuss the key capabilities of the KeeperPAM Platform, such as SSO integration, privileged credential management, credential vaulting, and session management, monitoring, and recording.

Webinar Recording
Mehr Widerstandsfähigkeit Gegen Cyberangriffe: Das Automatisierte SOC
Mar 03, 2023

SOCs müssen heute viel stärker automatisiert werden als in der Vergangenheit. Nur so kann auf die stetig wachsende Bedrohung auch in Zeiten einer Ressourcenknappheit bei Cybersicherheitsexperten reagiert werden. Zudem müssen sich technische Lösungen eng mit den Prozessen von der Analyse von Schwachstellen bis hin zum Umgang mit kritischen Sicherheitsereignissen integrieren. Das setzt moderne Technologie, aber auch das richtige Zusammenspiel zwischen Technologien, Prozessen sowie internen und externen Experten voraus.

Martin Kuppinger, Principal Analyst bei KuppingerCole Analysts, wird auf die Anforderungen an moderne SOCs (Security Operations Centers) eingehen und dabei insbesondere die Bedeutung von Automatisierung und Integration betrachten. Dabei steht SOAR als Technologie im Fokus. Die organisatorischen und technischen Voraussetzungen und die wichtigsten Anwendungsfälle, aber auch die Überlappung und Schnittstellen von SOAR zu anderen Sicherheitstechnologien für ein modernes SOC werden im Vortrag beleuchtet.

Thomas Maxeiner, Sr. Manager Presales  bei Palo Alto Networks, wird Einblicke in den Lösungsansatz XSOAR (eXtended SOAR) von Palo Alto Networks geben. Er wird beschreiben, wie man solche Lösungen effizient als Erweiterung bestehender SOCs oder als Basis von neuen SOCs umsetzt. Er wird darüber hinaus die wichtigsten Fähigkeiten von XSOAR und ihre Relevanz für moderne, hoch automatisierte SOCs betrachten und auf das Zusammenspiel mit weiteren Lösungsbereichen der Cybersecurity wie ASM (Attack Surface Management), XDR (eXtended Detection and Response) und den Palo Alto XSIAM-Ansatz (eXtended Security Intelligence and Automation Management) eingehen.

Webinar Recording
3rd Party Identity Risk – Der Feind Im Eigenen Haus (?)
Jun 14, 2023

Hierzu ist es unerlässlich, Identitätstypen nicht als voneinander getrennt agierende Entitäten, sondern als ineinander verwobene Fasern zu begreifen – die Identity Fabric. Erst durch diese Meta-Sicht kann eine zuverlässige Risikoabwägung erfolgen, die für den korrekten Umgang mit IoT-Identitäten grundlegend ist. Zuletzt ist die Reduktion von aufwändigen internen Prozessen und Kosten ein weiterer Faktor für die erfolgreiche Modernisierung des Identitätsmanagement in Ihrem Unternehmen.

In diesem Webinar lernen Sie:

  • Die wichtigsten Unterschiede zwischen verschiedenen Arten von Identitäten und ihren Zugriffsrechten kennen
  • Die Rolle der Lieferkette als schwächstes Glied im Zugriffsmanagement näher kennen
  • Wie Sie eine Vielzahl von Identitäten auch in externen Unternehmenseinheiten managen
  •  Wie ein sicherer Remote-Access für Menschen und Maschinen gewährleistet werden kann
Webinar Recording
Re-Imagining Identity Management for the Digital Era
Mar 10, 2023

Join identity and security experts from KuppingerCole Analysts and ARCON for a lively discussion about what exactly are the biggest identity challenges facing modern businesses, how those challenges are likely to evolve, and what could be done to meet current and future needs.

Participate in the debate between Martin Kuppinger, Principal Analyst at KuppingerCole Analysts and Gautam Singh Deo, Director - Strategic Business Engagements at ARCON as they discuss how to move beyond siloed approaches to ensure a security outcomes approach that is focused on identity.

Put your questions forward as our experts consider how best to achieve an identity-centric strategy that combines the best of Zero Trust, IAM, IGA and PAM, and as they explore the benefits of a converged identity security approach using Contextual Data Models.

Webinar Recording
Achieve Effective Risk and Vulnerability Management With a Platform Approach
Jun 16, 2023

Join security experts from KuppingerCole Analysts and Tanium as they discuss the common challenges faced in identifying, prioritizing, and remediating security vulnerabilities, and how to overcome them by adopting a proactive approach that will increase efficiency and reduce risk.

Richard Hill, Director of IAM Research and Lead Analyst at KuppingerCole, will discuss the value of Software Bill of Materials (SBOM), asset, and endpoint management. Also, how understanding the context of what you have can help surface software and endpoint vulnerabilities and compliance risks within an organization through visibility.

Bryant Bell, Director Product Marketing – Risk & Compliance at Tanium will outline a platform approach to identify, prioritize, and remediate vulnerabilities to achieve greater speed, scalability, and visibility to improve efficiency and reduce risk.

Webinar Recording
Pioneering Zero Trust Network Access With Intelligent Microsegmentation
Mar 29, 2023

Adopting a Zero Trust security model of strict identity verification and access control for every user or device is widely accepted as a solution, but many organizations struggle to find the best route to implementing it. Join security experts from KuppingerCole Analysts and Zero Networks as they discuss network segmentation as a departure point and how microsegmentation is evolving to make it easier to use.

Alexei Balaganski, Lead Analyst at KuppingerCole Analysts will explain the problems with network security, how microsegmentation addresses those problems, what it is, how it works, and why previously it has not been more widely recognized and adopted as a means of achieving ZTNA.

Nicholas DiCola, VP of Customers at Zero Networks will outline and demonstrate the concept of intelligent microsegmentation. He will explain how this approach makes it easy for organizations to use microsegmentation to achieve least privilege networking automatically and in a scalable way for every user and device without having to deploy agents or configure policies.

Webinar Recording
The Evolution of Secure Access in Critical Infrastructure
Oct 13, 2023

Join security experts from KuppingerCole Analysts and Cyolo as they discuss how access is evolving and the challenges that brings for OT/ICS/CIS environments. They will look at the potential benefits of technologies such as SIEM, SOAR, ITSM, PAM, IAM and XDR, and concepts such as MFA, ZTA, and ZTNA, as well as ways of reducing risk and meeting insurance requirements.

John Tolbert, Lead Analyst at KuppingerCole will give examples of threats to OT/ICS/CIS environments and the associated risks. He will describe how critical infrastructure differs from general IT, and how IT security tools can help protect it. He will also look at Zero Trust Network Access principles and how they apply.

Kevin Kumpf, Chief OT Strategist at Cyolo will explain the concept of application access, discuss a unified approach to using IT security tools, look at how these tools and process change can help address OT staff shortages, examine the impact of devices such as software PLCs on organizations, and explain how to achieve future-proof secure remote access.

Webinar Recording
Understanding the Privacy Evolution to Get Ahead of the Curve
Mar 01, 2023

Join privacy experts from KuppingerCole Analysts and OneTrust as they discuss the evolving privacy landscape and how businesses can navigate it successfully, as well as share guidance on how to evolve privacy programs to become embedded in corporate culture and technology.

Paul Fisher, Lead Analyst at KuppingerCole will explain why security awareness alone, is not enough, and how organizations can improve privacy in the cloud by using technologies such as PAM and CIEM. He will also discuss the importance of being aware all privacy and compliance laws, and the benefits of adopting a Zero Trust approach to security.

Sam Gillespie, Senior Solutions Engineer at OneTrust will explain how to build proactive privacy programs based on global best practices. He will also talk about integrating privacy and data governance initiatives, demonstrating transparency, and enabling trusted data use.