26 past events found
+ 2 on-demand webcasts found
Back to Search Begin New Search Save Search Auto-Notify
PCI Compliance: Staying One Step Ahead...
The Payment Card Industry Data Security Standard (PCI DSS) is a set of requirements intended to ensure that all companies that process, store, or transmit credit card information maintain a secure environment. And while probably one of the most prescriptive industry regulations available in the market, many organizations are struggling to turn their PCI compliance paper blueprint into an effective security program that withstands the scrutiny...
June 25, 2020
Organizer: Centrify
Location: Webcast
Add Favorite
MFA: Moving the World Beyond Passwords
Another World Password Day has come and gone, but do we really "celebrate" passwords or are they something we wish would just go away? Andrew Shikiar, the Executive Director & CMO of the FIDO Alliance, joins us share how the FIDO Alliance helps reduce the world’s over-reliance on passwords, focusing on their latest set of technical specifications - FIDO2. This is the industry’s answer to the global password problem, addressing...
June 18, 2020
Organizer: Centrify
Location: Webcast
Add Favorite
Mission: Possible - More Compliant with...
Government agencies hold a vast amount of sensitive information, ranging from personnel records, budgetary data, inter-community communications to intelligence findings related to terrorists and hostile nations. In turn, governments all over the world are continually under threat of cyber-attacks launched by rival nation-states, terrorist groups, hacktivists, and cyber criminals. In addition, they are facing insider threats as showcased by Edw...
May 28, 2020
Organizer: Centrify
Location: Webcast
Add Favorite
CyberCast LIVE: Minimizing Ransomware E...
KILL TWO BIRDS WITH ONE STONE:RANSOMWARE & PRIVILEGED ACCESS ABUSE While security awareness programs, regular updates to anti-malware, application whitelists, and data back-up cover your security basics, organizations need to understand that ransomware is just one form of exploit that can easily be replaced by another. According to Forrester, an estimated 80 percent of data breaches are tied to privileged access abuse. By implementing Iden...
May 14, 2020
Organizer: Centrify
Location: Webcast
Add Favorite
Cybercast Live: Secure Remote Access fo...
YOU’VE SECURED THE WORKFORCE, NOW SECURE PRIVILEGED ACCESS. Current work-from-home requirements have resulted in organizations enabling entire workforces for remote access. As the FBI and other agencies report, this is a boon for cyber attackers who see this expanded attack surface as a feeding frenzy opportunity. Organizations of all sizes are at increased risk and need to secure remote access for privileged users, whose identities can...
April 13, 2020
Organizer: Centrify
Location: Webcast
Add Favorite
Human Insights on the RSA Human Element
The theme of the 2020 RSA Conference is the Human Element because humans are not only the most frequent cause of cyberattacks, but also the most powerful tool in preventing them. Each RSA Conference brings together thousands of your peers, offers hundreds of opportunities to learn from the industry’s most respected experts, and introduces attendees to the latest, most disruptive and cutting-edge cybersecurity approaches and solutions. Wh...
March 5, 2020
Organizer: Centrify
Location: Webcast
Add Favorite
The Anatomy of a Hack: Perception vs. Reality
Learn the anatomy of a hack.Prevent a data breach. It’s a common belief that data breaches require a tremendous amount of sophistication to “break” through the almost impenetrable perimeter defenses that organizations have put in place. Hackers don't break in. They log in! Post-mortem analysis concludes that the source of a hack is most often compromised credentials, and the data proves it: 74 percent of respondents acknowled...
February 13, 2020
Organizer: Centrify
Location: Webcast
Add Favorite
Cybersecurity Best Practices: The Basic...
Cybersecurity Best Practices: The Basics and Beyond October is National Cybersecurity Awareness Month and a great time to take a critical look at your cybersecurity at home, in the office, and everywhere you go. Many people adopt different attitudes and practices regarding their personal and professional cybersecurity. It's our responsibility to protect not only ourselves but also our organizations. The first step is to be aware of modern thre...
October 29, 2019
Organizer: Centrify
Location: Webcast
Add Favorite
Securely Moving Workloads into the Cloud
Organizations are increasingly moving their workloads to the cloud to achieve greater agility, flexibility, and cost savings. According to Gartner, spending on cloud infrastructure services will grow from $39.5 billion in 2019 to $63 billion through 2021. However, when transitioning to the cloud, it’s critical to understand that cloud security is a shared responsibility between the cloud service provider and the customer. The cloud servi...
September 27, 2019
Organizer: Centrify
Location: Webcast
Add Favorite
5 Myths of Privileged Access Management...
IT professionals engaged in cloud migration projects are legitimately concerned about security. Their organizations may have deployed a Privileged Access Management (PAM) solution to secure on-premises infrastructure yet worry remains whether legacy PAM can adapt to secure the entire hybrid enterprise. But with information overload it is hard to tell fact from fiction. To help uncover the facts, we’re hosting a webinar on August 29th whe...
August 29, 2019
Organizer: Centrify
Location: Webcast
Add Favorite
Back to Search Begin New Search