Protecting Critical Infrastructure with...
The identity landscape is more vital and intricate than ever before. Between growing security threats, evolving compliance mandates, and regulations, agencies are facing increased pressure to update and secure their infrastructure and networks. During this webinar, industry experts will share why an integrated identity and access governance management strategy is at the core of a strong cybersecurity program, the framework for developing a suc...
Enabling User Behavior Analytics
For years the identity and security communities have promised real-time analytics and a digital killswitch for anomalous user behavior. Up until now, it's truly been lots of promises and no real proof. User Behavior Analytics provides a bridge between the real-time security context aggregated through SIEM products and the business context embedded within the SailPoint identity governance platform. With new threats emerging every day, security...
Onboarding New Employees
DateWebinarSummary Archived recording It's All About the Data Most organizations look to HR for the data that drives their identity governance systems. In reality, that's just the start. Archived recording Accelerating Access to Applications Learn how to utilize attributes to automatically grant and revoke access to applications and best practices onboarding new ones. Archived recording Matering Data Quality Identity governance solutions serv...
Identity Governance Forum - The Evoluti...
This year the pivot to virtual work happened practically overnight. It was unprecedented and it was mandatory. It was also enlightening. The Evolution of Identity governance forum will dive into how the past few months have revealed the critical role identity plays into security.As government agencies move to modernize identity to support digital transformation and adapt to new missions, they must look across their complete portfolio of identi...
December 8-10, 2020
Organizer:
SailPoint Location:
Virtual
Managing Applications With DevOps
Managing hundreds or even thousands of applications within any identity governance tool is a nightmare. If you have to utilize developers to configure and code every application then you'll need to staff your own army. Additionally, applications are always changing, adding new roles and entitlements to get the job done. In this session, we will explore the ways that UberEther has been able to onboard hundreds of applications a year within a si...
Certifying & Offboarding Contractors
DateWebinarSummary Archived recording It's All About the Data Most organizations look to HR for the data that drives their identity governance systems. In reality, that's just the start. Archived recording Accelerating Access to Applications Learn how to utilize attributes to automatically grant and revoke access to applications and best practices onboarding new ones. Archived recording Matering Data Quality Identity governance solutions serv...
Addressing Cloud Vulnerabilities with V...
Federal agencies are rapidly adopting cloud infrastructure including Amazon Web Services (AWS), Microsoft Azure or Google Cloud Platform and they are realizing the enormous benefits. But without the right visibility and control, organization could quickly become vulnerable to risk.They are taking advantage of matching the requirements of each use case to the unique strengths of each cloud platform. What these agencies lack, however, is a way t...
September 14, 2020
Organizer:
SailPoint Location:
Webcast
Identity Governance in Multi-Cloud Envi...
These days, more than three out of four agencies use multiple cloud platforms. This gives them the freedom to match the requirements of each use case to the unique strengths of each cloud platform, whether it’s AWS, Azure or Google Cloud Platform. What these agencies lack, however, is a way to effectively and securely govern access across these multi-cloud environments. These challenges leave businesses open to the risks and costs of non...
Enabling Secure Cloud Services for Telework
Organizations have long struggled with ways to keep their environments secure across all access modalities. Complicated digital transformation and IT modernization initiatives that organizations have been forced to reckon with since the explosion of cloud workloads and mobile endpoint access have led to organizations being less prepared for events such as an extreme telework scenario. Providing scalable, consistent and frictionless access has...
2019 Identity Governance Forum
Today’s information technology (IT) environment is constantly changing, bringing new opportunities along with new risks. Agencies across the federal government are challenged to keep pace with technological advances, speed up digital transformation, and increasingly adopt cloud services and mobile apps. With digital engagements and transactions on the rise, securing access to sensitive and classified data becomes even more critical to mi...
December 4, 2019
Organizer:
SailPoint Location:
Washington, DC
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.