Passwords have been a constant throughout the internet era. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources across the applications we use daily.
But in this new digital age where data...
When it comes to enterprise security, Zero Trust is a concept that is becoming popular. More of a philosophy than a set of procedures, Zero Trust requires a deeper discussion and look at security. Is it practical for every one? Should Zero Trust be a priority? Why does it matter? What are the challenges? What is...
The IT and security heads are challenged from time to time about keeping the systems up and running, with availability and cyber resilience paramount. Breaking the kill chain is critical to understand in securing the environment. How can a ‘zero trust’ architecture be used in building this network and security...
Migrating to Zero Trust is a journey not often easily achieved. Zero Trust and legacy workflows can coexist as you tackle one business process at a time as your organization aspires for a higher level of operational maturity and greater cybersecurity resilience. Join Hitachi ID as we discuss how to create a Zero Trust...
In both the public and private sectors, Jeremy Grant has long been a leading force in shaping how government and enterprises respond to the evolving needs of identity security.
In this exclusive session, Grant discusses:
The “State of Identity” and what COVID-19 has taught us about the inadequacies of the...
People, applications, devices - they all have digital identities, and in today's transformed environment they all demand new approaches to identity and access management. In this exclusive panel, three CISOs discuss their unique IAM challenges, including:
Protecting medical devices
Managing user (and identity)...
In this panel session we talk to three security veterans about how their IAM challenges have been compounded since going remote and what security controls they’ve put in place to assist this change. We also discuss the importance of adopting a holistic identity strategy and how to get the business on side to support...
Zero trust has truly come of age in the last 12 months, but there are many misconceptions relating to what it is, where to start on the journey and how to manage user privileges in a zero trust environment. One of the fundamentals for zero trust is strong authentication to ensure that the right assets are connecting...
Join this session to learn from Richard Bird, Chief Customer Information Officer, Ping Identity. And Gray Mitchell, CISO + VP of Advisory and IDMWORKS, how to communicate the value of customer identity and ensure that it is recognized, funded and prioritized like the revenue-generating behemoth that it is. We’ll end...
Network security architectural best practices are undergoing a dramatic shift. Two prominent IT security trends have dominated InfoSec discussions during this ongoing pandemic: Zero Trust Network Access (ZTNA) and Secure Access Service Edge (SASE). In practical terms, which is more important, what is the relationship...
Today's big challenge facing enterprise security is the 'dark web,' an ungoverned and seemingly ungovernable internet area where you can browse and communicate with complete anonymity. Through the use of dark web and crypto currencies, criminals have been able to very successfully run 'crime-as-a-service' model. The...
In this ‘zero trust’ era, DNS remains a favorite target and attack vector due it’s criticality for linking users to apps. 79% of organizations suffered DNS attacks, causing severe impacts such as app downtime. But as it sees almost all traffic intent, DNS is ideally placed to be your first line of defense...
We typically think of supply chain attacks as stealthy attacks on hardware components, such as malware on laptops and network devices. Still, the supply chain attack was an attack on a service provider that cannot be ruled out as it is a significant intrusion of the entire ecosystem. The supply chain attacks ushers in...
The biggest challenge for practitioners today is to enable greater flexibility for a remote workforce while being fully compliant and secure. The "zero trust" model can play a critical role, but implementing it is a daunting task, and there's no "one size fits all" approach to making the transition to a zero trust...
Speakers:
Bithal Bhardwaj, Group CISO, GMR Group
Rajashekar P, Director, ISAC
Cybersecurity is a two-sided proposition, requiring both defenses of internal networks and operating effectively in the cyber domain. The first side is to secure the networks that are undoubtedly necessary, organizing budgets,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.