Thursday, January 25, 2018 at Webinar for ISC2 Members Only; Registration Required
Starts at 1:00 PM · Ends at 4:00 PM, EDT (America/New_York)
Organizations need to provide convenient yet secure access so that users can get to the information they need regardless of whether the application is on premises or in the cloud. Modern approaches to access leverage risk analytics and context-based awareness of users to provide seamless, secure access to data and resources. Paired with a solid approach for identity assurance, organizations can have the confidence that people are who they say they are, all while providing a very favorable user experience that doesn’t slow the business down.
Join RSA identity experts and learn how a modern, secure access strategy and the right technologies can enable your organizations to:
- Be sure that the users accessing applications and data are trusted, legitimate users.
- Achieve a new level of identity assurance enabling the business to possible to grow and innovate.
- Speed user access to applications with a convenient user experience, enabling the organization to get more done.
- Meet the diverse set of user access needs and environments with the flexible, seamless authentication options available - from hardware and software tokens, to biometrics to FIDO (Fast Identity Online) tokens.
- Minimize access risk by governing access using contextual, risk-based authentication evaluating in real-time the risk factors that are present.
This webinar is a “Summit” and consists of 3 1-hour webinar presentations, listed below:
Transforming Secure Access
Speaker: Ayelet Biger-Levin
As identity theft and credential-based attacks continue to rise, organizations wonder how this can be when they’re investing so much time and effort deploying identity and access management solutions. Unfortunately, despite their best efforts, Identity has become the most consequential attack vector to the modern enterprise. They are essentially outmatched by increasing identity risks. If you’re feeling the pressure, you can’t afford to miss this webinar. Join Ayelet Biger-Levin of RSA to learn how to transform the way you secure access in the modern enterprise. You’ll learn how identity intelligence, business context and threat intelligence work together to build a strong foundation for secure access and an overall high degree of identity assurance.
Modernizing Authentication in and for the Cloud
Speaker: Tony Karam
Let’s face it — when it comes to moving applications and data to the cloud, enterprises want to streamline operations and deliver a better user experience. However, they don’t want to sacrifice security or performance. In fact, modern enterprises expect a journey to the cloud that ultimately enables better security. Better access. Better performance. The question is: Is it possible? Unless you have an effective way to authenticate all your users who are trying to access data in the cloud from anywhere on any device, you might be handing over your greatest assets to an imposter. This is where a modern approach to authentication is important – one that is pervasive, continuous, risk-aware. Otherwise, how can you be certain that the person and their devices are really whom they purport to be? Tony Karam will investigate access strategies for the journey to the cloud in this webinar.
Delivering Authentication Your Way – Why One size No Longer Fits All in the Access Game
Speaker: Murtaza Hafizji
The market demands are more like “Have it your way!” for modern approach to authentication…that’s why many of the one-trick ponies that can only do one thing for certain apps will become obsolete or acquired as Access Management vendors will face the complex reality that enterprises who want modern authentication will also want access that’s pervasive, connected and continuous – not just 2FA or SSO. Join Murtaza Hafizji for this webinar and learn how to leverage a trusted, secure access platform that provides access to all users, to all apps from anywhere at any time in a smart, secure and noninvasive way.
*NOTE: This webinar will be re-purposed and presented again in Feb/March to our RSA customers and prospects who are not ISC2 members using our ON24 platform so that everyone can see the webinar. Check 'Upcoming Events' on the RSA Product Overview pages for updates.
Webinar for ISC2 Members Only; Registration Required