Webinar Recording

Mastering Global IAM for Cybersecurity Excellence: From Zero Trust Principles to Identity Threat Detection & Response (ITDR)

Show description
Speakers
Paul Fisher
Lead Analyst
KuppingerCole
Paul Fisher
Paul Fisher is a Lead Analyst who researches primarily on cybersecurity and identity and access management (IAM). He also studies trends in AI, IoT and data governance for different industry...
View profile
Andre Priebe
Chief Technology Officer
iC Consult Group GmbH
Andre Priebe
Andre Priebe serves as the Chief Technology Officer at iC Consult Group, a vendor-independent system integrator specializing in Identity & Access Management, with a global team of over 800...
View profile
Lead Sponsor
iC Consult Group
Top related content
Webinar Recording
Making Zero Trust Work With the NIST Framework
Dec 17, 2020
There’s lots of hype around Zero Trust Security in the context of our changing mobile and cloud-centric working environments. Moving towards a modern and agile Zero Trust security concept is essential in today's mobile first, work-securely-from-anywhere world.
Webinar Recording
Zero Trust: Solving IT Security’s Identity Crisis
May 04, 2018
Although companies are constantly increasing their cybersecurity budgets, this does not seem to help much: each day we learn about new large-scale data breaches. Considering that over 80% of hacking-related breaches leverage compromised user credentials, it’s mindboggling why so many organizations are still focusing on securing their network perimeters.
Event Recording
Dr. Torsten George - Zero Trust: Solving IT Security’s Identity Crisis
May 16, 2018
Although companies are constantly increasing their cybersecurity budgets, this does not seem to help much: each day we learn about new large-scale data breaches. Considering that over 80% of hacking-related breaches leverage compromised user credentials, it’s mindboggling why so many organizations are still focusing on securing their network perimeters. This keynote outlines an entirely new approach — Zero Trust Security. This paradigm assumes that nothing in your corporate IT infrastructure — including users, endpoints, networks, and resources — is ever trusted,...
Executive View
Sharelock ITDR
Mar 22, 2023
ITDR (Identity Threat Detection & Response) is an emerging capability that is of utmost importance for dealing with the ever-increasing number of identity-related threats. Being able to identify anomalies and threats across a wide range of systems is the foundation for proper response. Sharelock provides such ITDR solution that identifies a wide range of IoBs (Indicators of Behavior) for spotting threats and triggering appropriate reactions, based on advanced ML (Machine Learning) capabilities.
Webinar Recording
Zero Trust Through Identity-Based Segmentation
Jul 21, 2021
As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict identity verification and access control for every user or workload offers an alternative that secures data while ensuring it is accessible to those who need it.
Webinar Recording
2020 Is the Year of the Identity Management Revolution
Oct 14, 2020
2020 has been the year of dispersed workforces and working environments. The impact on existing infrastructure, strategies and legacy technology has been unprecedented. As a result, we embarked on a revolution for Identity & Access Management and a mind-set change for organizations big and small, global or local. Never before has IAM been more present and upfront. In this new world, trusted identities need to be the starting point for all organizational strategies and driving organizational change.
Webinar Recording
Unify Identity and Security to Block Identity-Based Cyber Attacks
Dec 07, 2022
Join security and identity experts from KuppingerCole Analysts and ARCON as they discuss the importance of securing enterprise credentials, explain why a unified identity security approach in line with Zero Trust principles improve security and efficiency, and describe how to combine solutions to address key identity security issues. John Tolbert, Director Cybersecurity Research at KuppingerCole will cover the background on identity involved data breaches and discuss the need for identity threat detection. He will also describe where identity fits in the MITRE ATT&CK matrix, and how...
Webinar Recording
The Future of Identity Security: PAM+CIEM+ITDR
Nov 03, 2023
Join identity and experts at KuppingerCole Analysts and BeyondTrust as they discuss the impact of the evolution of business IT, the trends shaping the identity landscape, the importance of identity security, and the role of privileged access management (PAM), cloud infrastructure entitlement management (CIEM), and identity threat detection and response (ITDR). Martin Kuppinger, Principal Analyst at KuppingerCole, will look at the convergence of PAM, CIEM, and ITDR, and their place within the Identity Fabric concept. He will analyze why new technologies are required to deal with...
Webinar Recording
A Zero Trust Approach to Cyber Resilience
Oct 13, 2022
Security in many organizations is not evolving fast enough to keep up with business transformation, including migration to the cloud and to Industry 4.0. These changes, while essential to remain competitive, bring fresh security risks. A new approach is needed to ensure cyber resilience. Join security experts from KuppingerCole Analysts and Illumio as they discuss the need to go beyond cyber-attack prevention to cyber resilience, which is aimed at keeping business operations running in the face of ransomware and other cyber-attacks. Survival is all about having a plan to restrict the...