Webinars

Upcoming Webinars

Webinar

Interoperability and Intelligence: Two Keys to a Successful Privilege Management Deployment

As businesses are becoming increasingly digital, their IT infrastructures are continuously growing in scale and complexity, with vast numbers of previously disparate systems and platforms woven together by new communications channels. Many of these systems are no longer located within the corporate perimeter, having partially or completely migrated to the cloud. Even those which still remain on.premises, must be constantly accessible to mobile workers, external contractors or support engineers. More

Webinar

Customer Identity Management (CIAM) - Building the Foundations for a Next-Level User Experience

Digital Transformation is all about following the connected consumer into the new world of digital services, throughout all available channels, highly individualized, privacy aware, compliant and value driven "by design". CIAM describes the underlying infrastructure enabling your business to do so. More

Webinar

GDPR Compliance Countdown to Adequacy – Minimum Preparation to be Compliant

With less than a year to go before EU GDPR (General Data Protection Regulation) comes into force your organization needs to be ready to comply with these requirements that demand better controls over how it uses and manages the personal data that it holds. More

Past Webinars

Webinar

How Advanced Identity and API Management Helps You Meeting the Security Challenges of Digital Transformation

The new business environment is increasingly reliant on web and open source applications, with external partners and customers accessing resources via web browsers and social media channels. More

Webinar

Delegate the Task, Not the Privilege: How to Simplify and Secure Your Privileged Accounts

Privilege Management has been a key element of both IAM (Identity & Access Management) and cyber security programs for years. However, increased the complexity of modern corporate IT infrastructures with growing reliance on outsourced IT staff and mounting pressure from compliance regulators More

Webinar

(Big) Data Security: Protecting Information at the Source

The ongoing Digital Transformation has profoundly changed not just IT infrastructures, but in many cases, entire business models and processes for many organizations. Digital information has become one of the most precious assets of nearly every company, and for many, it is no longer just another More

Webinar

Identity 2.0: The Next Generation of Customer Identity

Consumer identity and access management solutions have emerged in the recent years to meet evolving business requirements. CIAM is bringing value to the organizations regarding higher numbers of successful registrations, customer profiling, authentication variety, identity analytics, and marketing More

Webinar

Getting Identity and Access Management Right – Even If SAP Is Involved

Implementing Identity and Access Management universally across multiple IT infrastructures and software platforms is a major challenge for any organization. To do their daily job successfully, users today expect to get access to information they need from anywhere at any time, regardless of the More

Webinar

Architecting a Digital Strategy for PSD2 and Open Banking

PSD2 and the Open Banking Standard are regulatory mandates being applied to the banking industry by the European Banking Authority (EBA) and Competition & Markets Authority (CMA) across Europe and in the UK respectively. The regulations require that banks operating across the region expose open More

Webinar

Rollenmanagement erfolgreich etablieren sowie sicher und effizient betreiben

Das Management des sicheren Zugangs zu Ressourcen innerhalb einer Organisation ist eine der zentralen Aufgaben im Bereich des Identity und Access Managements. Die Aufgliederung existierender organisatorischer Komplexität durch deren Abbildung in handhabbare Rollen ist eine kontinuierliche More

Webinar

Digital Transformation in Government

Digital transformation is increasingly affecting all types of organisations including Governments. In order to encourage citizens to adopt digital services, the least expensive channel for governments, it is necessary to support modern connection methodologies and provide user-focussed services. More

Webinar

Making the Cloud a Secure and Easy to Use Environment

Most of today’s organizations store even their sensitive data in the cloud. Moving workloads to the cloud results in improved flexibility, elasticity, and reduced time to market for organizations. Nevertheless, companies have to realize these benefits painlessly, while keeping sensitive data More

Webinar

Managing the User's Consent Life Cycle: Challenges, GDPR Compliance and (Business) Rewards

Companies that manage consumer identities and personal profiles have a bit more than one year left to comply with the new European General Data Protection Regulation (EU-GDPR). More

Next Webinar

Webinar

Interoperability and Intelligence: Two Keys to a Successful Privilege Management Deployment

Language:

English
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • Jun 28, 2017 4:00pm CEST, 10:00am ET, 7:00am PT
Register Now

Popular Webcasts

Next Conference

Conference

Consumer Identity World Tour 2017

The Consumer Identity World Tour is the place where you can dive deeper into the world of CIAM. Learn more about privacy by design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00