When it comes to enterprise security, Zero Trust is a concept that is becoming popular. More of a philosophy than a set of procedures, Zero Trust requires a deeper discussion and look at security. Is it practical for every one? Should Zero Trust be a priority? Why does it matter? What are the challenges? What is...
The IT and security heads are challenged from time to time about keeping the systems up and running, with availability and cyber resilience paramount. Breaking the kill chain is critical to understand in securing the environment. How can a ‘zero trust’ architecture be used in building this network and security...
Migrating to Zero Trust is a journey not often easily achieved. Zero Trust and legacy workflows can coexist as you tackle one business process at a time as your organization aspires for a higher level of operational maturity and greater cybersecurity resilience. Join Hitachi ID as we discuss how to create a Zero Trust...
In both the public and private sectors, Jeremy Grant has long been a leading force in shaping how government and enterprises respond to the evolving needs of identity security.
In this exclusive session, Grant discusses:
The “State of Identity” and what COVID-19 has taught us about the inadequacies of the...
People, applications, devices - they all have digital identities, and in today's transformed environment they all demand new approaches to identity and access management. In this exclusive panel, three CISOs discuss their unique IAM challenges, including:
Protecting medical devices
Managing user (and identity)...
In this panel session we talk to three security veterans about how their IAM challenges have been compounded since going remote and what security controls they’ve put in place to assist this change. We also discuss the importance of adopting a holistic identity strategy and how to get the business on side to support...
Zero trust has truly come of age in the last 12 months, but there are many misconceptions relating to what it is, where to start on the journey and how to manage user privileges in a zero trust environment. One of the fundamentals for zero trust is strong authentication to ensure that the right assets are connecting...
Join this session to learn from Richard Bird, Chief Customer Information Officer, Ping Identity. And Gray Mitchell, CISO + VP of Advisory and IDMWORKS, how to communicate the value of customer identity and ensure that it is recognized, funded and prioritized like the revenue-generating behemoth that it is. We’ll end...
Network security architectural best practices are undergoing a dramatic shift. Two prominent IT security trends have dominated InfoSec discussions during this ongoing pandemic: Zero Trust Network Access (ZTNA) and Secure Access Service Edge (SASE). In practical terms, which is more important, what is the relationship...
In this fireside conversation, Christian Toon, CISO, Pinsent Masons LLP, reflects on what it takes to secure the digital workforce and keep up with the speed of change, refining cloud security approaches and the nuances of buying cyber insurance.
In this session, Toon will discuss:
Security transformation:...
Strong identity and access management (IAM) is one key to preventing data breaches and limiting the blast radius should a security incident occur. But cloud IAM presents a new set of constructs for organizations to build and manage. Is cloud IAM the best identity and access control ever, or yet one more reason to tear...
Establishing zero trust and least privileged access is key to securing privileged accounts. The Zero Trust model involves eliminating shared admin passwords so that every administrative action is authenticated uniquely, dynamically and specifically. The Least Privilege approach involves delegating to give each admin...
In this fireside chat, Dr Kevin Jones, Group CISO, Airbus, explains why the age-old expression, “Humans are the weakest link”, is a myth that must be broken. Instead, we need to adopt human centric approaches to cybersecurity that make humans the last line of defense.
In this session, Jones will...
In this talk, Allan will look at how the enterprise thinks of user data, and how the old paradigm is failing. He will talk about the new realities of consent, often dictated by law, and how they are failing badly. And through a security lens, the trends are not getting better, and in fact are getting worse. He...
Each business unit has its unique policies that need to be incorporated into any IGA project, increasing complexity, and requiring a single mindset between all business leaders. In this session, we will break down the fundamental building blocks of identity governance and detail how to deploy to the cloud...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.