Back to Search Begin New Search Save Search Auto-Notify
Cloud PAM Confidence
GOING TO THE CLOUD? There are so many complex decisions companies, IT staff and Security professionals must make; your PAM solution does not have to be one of them. WHAT DOES A BEST-IN-CLASS PAM SOLUTION LOOK LIKE? Works across multiple Cloud Service Providers while providing the same level of protection in your existing datacenters Simple implementation that does not require large amounts of Infrastructure Can integrate with your existing wor...
September 15, 2020
Organizer: Centrify
Location: Webcast
Add Favorite
PAM 101
What is Privileged Access Management (PAM)? With so many names, acronyms and vendor capabilities, understanding PAM can be a challenge. Join us for this live webinar to learn what Privileged Access Management is and how PAM can enable you to reduce risk within your environment. We will review over the following key areas: What is Privileged Access Management Key objectives we see in every PAM project The history and evolution of PAM Key "gotch...
August 26, 2020
Organizer: Centrify
Location: Webcast
Add Favorite
CyberCast Live: Enabling MFA Everywhere
Forrester Research has estimated that 80 percent of security breaches involve weak, default, stolen, or otherwise compromised privileged credentials. As a result, cybersecurity experts have recommended augmenting usernames and passwords with multi-factor authentication (MFA) to add an additional layer of security for access control. By adopting an “MFA Everywhere” approach, organizations can establish a reliable deterrent and ultim...
August 11, 2020
Organizer: Centrify
Location: Webcast
Add Favorite
Identity-Centric PAM: The Catalyst to B...
The healthcare industry is a prime target for threat actors, as it deals with a vast amount of highly sensitive data which needs to remain current and accurate, as life or death decisions may depend on it. In turn, healthcare records are a hot commodity on the Dark Web, often going for a far higher price than credit cards. That’s why it’s no surprise that healthcare is a heavily regulated industry. Those who work in this vertical n...
July 30, 2020
Organizer: Centrify
Location: Webcast
Add Favorite
PCI Compliance: Staying One Step Ahead...
The Payment Card Industry Data Security Standard (PCI DSS) is a set of requirements intended to ensure that all companies that process, store, or transmit credit card information maintain a secure environment. And while probably one of the most prescriptive industry regulations available in the market, many organizations are struggling to turn their PCI compliance paper blueprint into an effective security program that withstands the scrutiny...
June 25, 2020
Organizer: Centrify
Location: Webcast
Add Favorite
MFA: Moving the World Beyond Passwords
Another World Password Day has come and gone, but do we really "celebrate" passwords or are they something we wish would just go away? Andrew Shikiar, the Executive Director & CMO of the FIDO Alliance, joins us share how the FIDO Alliance helps reduce the world’s over-reliance on passwords, focusing on their latest set of technical specifications - FIDO2. This is the industry’s answer to the global password problem, addressing...
June 18, 2020
Organizer: Centrify
Location: Webcast
Add Favorite
Mission: Possible - More Compliant with...
Government agencies hold a vast amount of sensitive information, ranging from personnel records, budgetary data, inter-community communications to intelligence findings related to terrorists and hostile nations. In turn, governments all over the world are continually under threat of cyber-attacks launched by rival nation-states, terrorist groups, hacktivists, and cyber criminals. In addition, they are facing insider threats as showcased by Edw...
May 28, 2020
Organizer: Centrify
Location: Webcast
Add Favorite
DoD Webinar: VPN-Less Secure Remote Acc...
YOU’VE SECURED THE WORKFORCE, NOW SECURE PRIVILEGED ACCESS WITHOUT A VPN. Current work-from-home requirements have resulted in government agencies enabling entire workforces for remote access. As the FBI and other agencies report, this is a boon for cyber attackers who see this expanded attack surface as a feeding frenzy opportunity. Agencies of all sizes are at increased risk and need to secure remote access for privileged users, whose...
May 20, 2020
Organizer: Centrify
Location: Webcast
Add Favorite
CyberCast LIVE: Minimizing Ransomware E...
KILL TWO BIRDS WITH ONE STONE:RANSOMWARE & PRIVILEGED ACCESS ABUSE While security awareness programs, regular updates to anti-malware, application whitelists, and data back-up cover your security basics, organizations need to understand that ransomware is just one form of exploit that can easily be replaced by another. According to Forrester, an estimated 80 percent of data breaches are tied to privileged access abuse. By implementing Iden...
May 14, 2020
Organizer: Centrify
Location: Webcast
Add Favorite
Cybercast Live: Secure Remote Access fo...
YOU’VE SECURED THE WORKFORCE, NOW SECURE PRIVILEGED ACCESS. Current work-from-home requirements have resulted in organizations enabling entire workforces for remote access. As the FBI and other agencies report, this is a boon for cyber attackers who see this expanded attack surface as a feeding frenzy opportunity. Organizations of all sizes are at increased risk and need to secure remote access for privileged users, whose identities can...
April 13, 2020
Organizer: Centrify
Location: Webcast
Add Favorite
Back to Search Begin New Search