22 webcasts found
+ 70 past events found
Back to Search Begin New Search Save Search Auto-Notify
Panel Webinar: Combatting Supply Chain...
With the increasing frequency and sophistication of supply chain attacks, it is critical for organizations to adopt a zero trust approach to their security strategy. This panel will bring together experts in endpoint, identity, and network security to discuss best practices for implementing zero trust in supply chain risk management. Panelists will explore the challenges and benefits of a zero trust model, share case studies of successful impl...
Add Favorite
Going Beyond Zero Trust Requirements
Zero Trust Architectures have become a focal point for the US Government in their efforts to improve the nation’s cybersecurity posture. Traditionally providing secure access to applications, including those hosted in the cloud, has forced agencies to make arduous compromises. They’ve needed to either sacrifice security for performance when bypassing security inspection, or performance for security by routing traffic through massiv...
Add Favorite
Department of Energy - Okta: Identity P...
Almost every organization has experienced a serious security breach or has felt the effects of a breach on another organization. To prevent breaches, Department of Energy labs often employ a variety of point solutions, but these aren’t comprehensive or simple to manage solutions. An identity based security strategy is the key to developing a Zero Trust Architecture (ZTA) that can help address DOE lab's security challenges. Join Okta in t...
Add Favorite
Google Workspace Okta Webinar
During this on-demand webinar, we discussed: How to empower your security team: Equip your team with seamless access to essential tools, all while safeguarding sensitive data. Enterprise Shield: Navigate compliance demands and combat cyber threats, ensuring you’re prepared for the challenges of today’s digital ecosystem. Streamlined Identity: Centralize management for streamlined IT operations and consistent user experience.
Add Favorite
Staying Ahead in the Evolving Landscape...
Attendees joined us for a webinar designed to help government agencies navigate CJIS compliance and explore the latest security measures. Attendees gained insights from real-world case studies, including the City of Garland and the City of Northport, showcasing the practical implementation of TecMFA and Tectango for Police. They also discovered how these solutions streamline operations, improve data security, and contribute to CJIS compliance....
Add Favorite
The State of Secure Identity: The Lates...
The log-in box is both the gateway and guardian to your customer facing applications and a prime target for threat actors looking to profit from account takeovers. As these cybercriminals utilize AI to get past the log-in box, protecting your applications also requires sophisticated AI-based layered defenses. Okta’s State of Secure Identity Webinar gave attendees insight into this evolving threat landscape and how you can best defend you...
Add Favorite
Automate Critical IT and Security Tasks...
IT and security teams today must do more with less, all while facing rising security demands and pressures to innovate. Attendees joined on July 24th to learn how Okta Workflows can help teams keep up by automating Identity processes at scale - with pre-built templates that remove the need to write code. Attendees also learned about how implementing Okta Workflows can help your team accelerate time-to-market, improve security posture, and redu...
Add Favorite
Strengthening Cybersecurity and Digital...
Across the nation, Government agencies are redefining digital interactions with the public. They’re modernizing systems and apps to improve service quality and speed. They’re developing a single, secure account for frustration-free access to everything. Yet, building strong digital relationships with the American public shouldn’t come at their expense. Neither should it come at the cost of your mission-critical applications....
Add Favorite
Build Smarter and Innovate Faster with...
Identity and Access Management (IAM) can significantly impact your business's financial outcomes. During this webinar, Okta's experts dove into the strategies and rationale behind IAM's influence on business success. This roundtable was designed for leaders in product development, engineering, and application development to explore how they can leverage Customer Identity and Access Management (CIAM) to distinguish their business in the marketp...
Add Favorite
Register Now: The Role of IAM in Zero Trust
Attendees joined Okta's Field CTO, Public Sector on August 21st for a webinar discussing The Role of IAM in Zero Trust. Zero Trust may be a buzzword for security leaders today, but there’s still a ton of relevancy in core Zero Trust principles. Okta discussed moving beyond the buzzword and repeated messages that fall short in providing a clear and concise path forward. For security practitioners who strongly advocate for Zero Trust, we...
Add Favorite
Back to Search Begin New Search