Featured
State of Secure Information Management
Hailey Todis, Sam Kumarsamy, Harley Adams
This survey of 300 industry participants and decision makers reveals what secure information management looks like in 2024 and beyond.
All episodes
-
Top Cybersecurity Investment Priorities for CIOs and CISOs in 2023
Michael Sampson, Senior Research Analyst, Osterman Research and Rob Aragao, Chief Security Strategist, OpenText Cybersecurity
How are cybersecurity priorities changing in 2023? CIOs and CISOs are responding to changing technology and data breach trends, the economic outlook, and escalating regulatory demands for cybersecurity and data privacy. Guest speaker Michael Sampson of Osterman Research uncovers CISO and CIO assessments of their own organizations’ relative cybersecurity strengths and weaknesses, and how and where they’re placing spending priorities.
Hear the research results and implications for four focus areas: applications, data, cloud platforms, and on-premises infrastructure.
• What types of cybersecurity incidents did respondents experience last year?
• Where do they see the biggest gaps between current and desired security posture?
• What are their top investment priorities?
• What is the impact of the Board of Directors on cybersecurity approaches?Download the Osterman Report to learn more about the top cybersecurity investment priorities for CISOs and CIOs in 2023: https://www.microfocus.com/ostermanreport2023
-
Data Privacy Compliance: A Look at Current Progress and Future Roadmap
Michael Sampson, Senior Research Analyst, Osterman Research and Rob Aragao, Chief Security Strategist, OpenText
Join us for an informative webcast sponsored by OpenText™ Voltage™, where we will explore the critical topic of privacy compliance obligations in the United States and Canada. In this webcast, we will delve into the challenges faced by organizations in meeting current and emerging privacy regulations and provide valuable insights from the analyst report Privacy Compliance in North America: Status and Progress in 2023 by Osterman Research.
Discover how organizations are navigating the complex landscape of privacy regulations, ensuring the appropriate protection of data and extending rights to individuals. Gain a deeper understanding of the implications of elevated privacy requirements and their impact on various industries.
Key highlights from the report include:
• The disconnect between claims of maturity and actual security realities.
• The growing trend of extending synthesized rights from state-level regulations to all residents in the United States.
• Insights into the commitment of compliance and legal teams towards privacy.
• Challenges faced in identifying and protecting sensitive data.
• Strategies for elevating protections and improving readiness for the next wave of privacy regulations.Don't miss this opportunity to gain valuable insights into privacy compliance practices and stay ahead of the evolving regulatory landscape. Register now for this informative webcast sponsored by OpenText™ Voltage™.
-
Make authentication as advanced as your business
Chris Barngrover, NetIQ, OpenText Cybersecurity and Jim Gerken, Novacoast, Inc.
With the ongoing expansion of multi-factor technologies to secure digital access for employees and consumers, the strong authentication market is forecast to continue its double-digit growth for at least the next five years. Add in the increasingly mainstream expectation of passwordless capabilities, and this growth will likely keep going.
In this webinar, Jim Gerken and Chris Barngrover review passwordless authentication best practices and how NetIQ enables organizations to deploy it across their environment. -
Scaling Passwordless Authentication
Chris Barngrover OpenText Cybersecurity, Dennis Robare MTIRX America Inc and Kent Purdy Opentext Cybersecurity
Today, passwordless authentication technologies are being used for more than multi-factor authentication. They are used to improve usability and resist phishing attacks while keeping friction low. Unfortunately, too often, deployment and implementation barriers prevent organizations from adopting password technologies to the level they want.
In this webinar, we will cover the following:
Considerations for selecting authentication methods and devices
Enrollment strategies for different methods
Forming a long-term strategy and set of practices for managing and maintaining your authentication environment -
Data Security Platforms - Present and Future
Heidi Shey, Principal Analyst, Forrester, Rob Aragao & Greg Clark, OpenText
Guest speaker Heidi Shey is a Principal Analyst at Forrester serving security and risk professionals. Her research primarily focuses on data security and privacy strategy, policies, and related technology controls. She will discuss Data Security Platforms, the new market segment defined in The Forrester Wave™: Data Security Platforms Q1 2023, with an overview of the research, key points not to miss, and a view to the future. Join us for a conversation with Heidi on the convergence of data security, privacy, and governance use cases. You’ll gain insights you can put into practice, including:
• Ways to achieve continuous data visibility to understand data value and risk
• How security and risk professionals are addressing data protection
• Operationalizing data security and privacy practices -
Raising access security without driving users crazy
Anupkumar Rajan, Senior Product Manager, NetIQ OpenText and Kent Purdy, Senior Product Marketing Manager, OpenText
In this session, we will discuss the security and business limitations of static authentication implementations. Discover the value of dynamic access control and find out how your organization can achieve it.
-
State of Passwordless: Latest insights from OpenText
Kent Purdy, Senior Product Marketing Manager NetIQ-OpenText ; Harley Adams, Product Marketing Manager NetIQ-OpenText
Weak passwords are notoriously vulnerable to phishing, brute force attacks, and social engineering. Increasingly, enterprises are removing them altogether, to eliminate these attack vectors and make it significantly harder for unauthorized users to gain access.
This webinar (March 12, 2024) explore a new survey from Dark Reading and OpenText on the use of traditional credentials among industry professionals and their urgency to move beyond them.
We’ll also cover the benefits IT and Security teams can expect by adopting a passwordless paradigm.
About OpenText IAM:
NetIQ Identity and Access Management Platform provides comprehensive workforce and customer identity solutions to enterprise scale organizations – leveraging Identity to provide secure access, effective governance, scalable automation, actionable analysis and insight across their Cloud, Mobile, & Data platforms.NetIQ is part of OpenText Cybersecurity. OpenText has completed the purchase of Micro Focus, including CyberRes. Our combined expertise expands our security offerings to help customers protect, detect, and evolve their security posture. They can confidently be their best—and more secure—across their entire organization.
LEARN MORE at the NetIQ homepage: https://www.microfocus.com/en-us/cyberres/identity-access-management
-
AI + Unsecured Data = Financial Risk
Greg Clark - Director, Product Management, OpenText Rob Aragao - Chief Security Strategist, OpenText
What happens when sensitive data collides with the power of artificial intelligence (AI)? How can your business protect itself against potential data breaches and ensure the security of sensitive information? In this webinar we explore the critical intersection of AI and sensitive data, exploring how to identify and measure the financial risk.
In today’s dynamic business landscape, risk is an ever-present companion. Organizations grapple with the stringent demands of regulatory compliance, including CPRA and GDPR. But what happens when sensitive data collides with the power of artificial intelligence (AI)? How can your business protect itself against potential data breaches and ensure the security of sensitive information? Voltage by OpenText helps you address these challenges by improving compliance and ensuring sensitive data remains protected throughout its lifecycle – all from a single data security platform.
Join us for an enlightening session where we’ll demonstrate how Voltage can help you:
• Quantify Monetary Risk: Understand the financial implications of managing personal information.
• Drive Data and Customer Trust: Strengthen relationships with stakeholders by safeguarding data throughout its lifecycle and ensuring data is secure before entering AI.
• Facilitate Secure Data Sharing: Promote ethical data exchange within your organization and with third parties.Secure your data for AI, build trust, and ensure compliance to propel your business forward—all from a single, comprehensive platform.
-
Don’t fall behind on your IAM maturity journey
Matt Graves, Identity and Privacy Evangelist – OpenText; Kent Purdy, Senior Product Marketing Manager, NetIQ – OpenText
We all know that identity maturity is an ongoing journey, not a one-time destination. Discover the best approach to building a robust identity strategy that empowers your users, protects your data, and fuels your business success.
-
Establish trusted AI with DSPM best practices
Rob Aragao, Chief Security Strategist; Greg Clark, Director, Product Management; Valeric Mayer, Senior Product Marketing Manager; OpenText
Great AI requires great data. To realize its potential, you must curate high-quality data in a responsible way. View this session to explore strategies for maintaining data safety, tackling complex challenges, and ensuring ethical practices.
-
State of Secure Information Management
Hailey Todis, Sam Kumarsamy, Harley Adams
This survey of 300 industry participants and decision makers reveals what secure information management looks like in 2024 and beyond.