Featured
Identity School: Unlocking your next horizon with unified identity security
Wendy Wu, Chief Marketing Officer, Sailpoint
Enterprises are building identity security solutions to defend against today’s most pressing security threats and regulatory concerns. But what happens when things change and new business needs emerge, more cyber threats arise, or regulatory considerations change? Having the right identity security foundation is more critical than ever when you must adapt and grow. Our unified approach to identity security has enabled the world’s leading enterprises to build identity programs capable of defending against threats today and tomorrow.
View our webinar and watch SailPoint’s Jaishree Subramania and Andrew Moore to learn how SailPoint Identity Security Cloud is tailored for enterprises no matter where they are in their identity security journey.
Our experts discuss:
How using the right tools such as “The Horizons of identity security 2023-24″ report is a critical first step in planning and re-evaluating your identity security journey.
The role a solid identity foundation such as SailPoint Atlas plays in long-term security and investment protection.
Exciting new updates to the SailPoint Identity Security Cloud suites that are tailored for enterprises no matter where they are in their identity security journey.
This info-packed session outlines a path to becoming more agile and strategic in how you safeguard your business without compromising productivity for your workforce.
All episodes
-
Identity School: From setbacks to strength: revitalizing your identity security strategy
Zach Hill, Security Automation Manager, H&R Block; Lynda Raley, Director, Customer Marketing, Sailpoint
Implementing an identity governance solution is a complex undertaking, given the depth and breadth of users, applications, data and resources the solution needs to touch. Sometimes things can go in directions you didn’t anticipate, and sometimes expectations and outcomes just don’t match.
Join us to hear from a SailPoint Identity Security Cloud customer who got a second chance. Learn about real-life circumstances that can cause a reset to a project and find out how trust and confidence in a technology partner can make the difference.
H&R Block will share how they got to take another bite of the IGA apple and learned the difference between an IGA vendor and a true implementation partner. Spoiler alert: they finally got a technology deployment that meets the needs of the business.
-
Identity School: Reduce security blind spots by locking down official data
Jeff Bounds, Identity Technologist, SailPoint
Identity security is typically concerned with who has access to what. For large enterprises, that “what” can encompass a truly staggering amount of data. This often includes proprietary company data and sensitive intellectual property spread across an expanding set of unstructured data sources, applications, and networks. With more users downloading, extracting, copying, and sharing data across a growing digital ecosystem, organizations face an expanded attack surface with serious repercussions: failed audits, large fines, repetitional damage, and an increased chance of data breach and theft.
So why should identity and access management professionals care about data access governance? Where do you get started? And how does it fit into a comprehensive identity security program?
View this webinar to watch SailPoint identity and data security experts as they discuss the convergence of identity and data security and what it means for enterprises today. They’ll shed light on how to start thinking about integrated data access governance and how to be a champion inside your organization as it faces the demands of digital transformation.
The experts will cover:
In everyday terms: What is unstructured data and what risks does it pose?
What are the key data access governance challenges facing organizations today?
Where does data access governance fit into your identity security program?
What steps can your organization take to protect its critical data today? -
Identity School: The Path to Autonomous Identity Security
Rick Wagner, Sr. Director of Product Management, Sailpoint
CISOs need simplified, standardized processes and improved visibility to establish an environment of collaboration, streamlined access management and a dynamic, accurate understanding of how their identity programs are securing their organizations against cybersecurity threats. The end goal? To receive insights into potential security risks occurring today and those that could be on the horizon and to make better access decisions that keep their organizations safe and productive.
SailPoint’s Autonomous Identity Governance (AIG) methodology, process and AI and ML enabled capabilities and insights are the new differentiator. Join Rick Wagner, Sr. Director of Product Management to learn how integrating AIS strategies, processes and tools provides security leaders with intelligence to collaborate with all stakeholders, navigate risks, enforce and optimize governance and controls that maintain least privilege access, prove compliance and drive continuous performance improvements in their identity programs.
-
Identity School: Signs that your approach to non-employee identity management is successful (…or failing)
Rob Sebaugh, Healthcare Strategist, SailPoint; Steve Toole, Principal Solutions Consultant, SailPoint
To increase flexibility and boost competitiveness, organizations have eagerly embraced growing a diverse population of consultants, partners, vendors, and other contingent labor, as well as non-human technologies like service accounts, bots, and smart devices. But it’s often difficult to gauge the maturity level of managing these third-party identities. The challenges and risks can be vague (and unrecognized) because the operational activities are often distributed across teams.
So, how can you tell if your organization has an appropriate maturity level for non-employee identity governance? Attend this webinar and get the specific signs to assess if your organization’s approach to non-employee identity management is set up for success (…or in danger of failing). You’ll also get a look at the SailPoint Non-Employee Risk Management solution.
-
Identity School: Solving the non-employee identity gap in third party risk management
Mike Conti, Product Marketing Manager; Brock Dooling, Advisory Solution Consultant
Providing third parties with internal access to data and systems has become a regular business practice for many organizations as they utilize partners, contingent workers, vendors, supply chains, contractors, non-humans, and other non-employees to increase efficiency and profits.
Unfortunately, most organizations do not have automated identity programs for these non-employees and the risk of a high-profile and costly breach continues to increase. According to a recent report, 51% of organizations attribute their data breaches to giving privileged access to third parties.
Attend this webinar to hear an update on:
How identity risk is impacted by the growing reliance of on non-employees, both human and non-human.
The flaws of popular methodologies in providing sufficient contextual identity data.
Key considerations needed to make well-informed, risk-based decisions about provisioning, verifying, and deprovisioning access to non-employees. -
Identity School: Unlocking your next horizon with unified identity security
Wendy Wu, Chief Marketing Officer, Sailpoint
Enterprises are building identity security solutions to defend against today’s most pressing security threats and regulatory concerns. But what happens when things change and new business needs emerge, more cyber threats arise, or regulatory considerations change? Having the right identity security foundation is more critical than ever when you must adapt and grow. Our unified approach to identity security has enabled the world’s leading enterprises to build identity programs capable of defending against threats today and tomorrow.
View our webinar and watch SailPoint’s Jaishree Subramania and Andrew Moore to learn how SailPoint Identity Security Cloud is tailored for enterprises no matter where they are in their identity security journey.
Our experts discuss:
How using the right tools such as “The Horizons of identity security 2023-24″ report is a critical first step in planning and re-evaluating your identity security journey.
The role a solid identity foundation such as SailPoint Atlas plays in long-term security and investment protection.
Exciting new updates to the SailPoint Identity Security Cloud suites that are tailored for enterprises no matter where they are in their identity security journey.
This info-packed session outlines a path to becoming more agile and strategic in how you safeguard your business without compromising productivity for your workforce.