Webinars
Upcoming
Webinar
In this webinar, you will gain insights about:
Strengthening Enterprise Cybersecurity: Adapting to Expanding Attack Surfaces and Enhancing IAM

Enterprise attack surfaces are constantly evolving and expanding due to the integration of cloud-based infrastructure, interconnected devices, and third-party solutions. New vulnerabilities are skillfully exploited by proactive cybercriminals every day. In this context, a strong Identity and Access Management (IAM) posture is vital to manage risks. However, maintaining this IAM strategy can be a complex task given the multitude of requirements and tools involved.

Join us for a compelling webinar on "Mastering Identity Security in the Age of Evolving Attack Surfaces." This session will address how to minimize human error, eliminate gaps, and overlaps within your different IAM tools, and align your security strategy with the constantly evolving challenges of today and tomorrow's cyber threats.

Speakers' Contributions

Larry Chinski Vice President of Global IAM Strategy at One Identity, and Martin Kuppinger, Principal Analyst at KuppingerCole, will guide you on aligning your security strategy with the ever-changing challenges posed by today's and tomorrow's cyber threats. Don't miss this opportunity to enhance your IAM posture and safeguard your enterprise from evolving risks.

Webinar
The Impact of Expanding Attack Surfaces on Enterprise Cybersecurity and Why You Need a Strong IAM Posture
Speakers
Larry Chinski Vice President of Global IAM Strategy
One Identity
Larry Chinski
Larry Chinski is Global Vice President of Global IAM Strategy at One Identity. He is responsible for the overall field execution (both inbound and outbound) for One Identity as it relates to...
View profile
Martin Kuppinger Principal Analyst
KuppingerCole
Martin Kuppinger
Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, a leading analyst company for identity focused information security, both in classical and in cloud environments. Prior to...
View profile
Lead Sponsor
One Identity
Top related content
Blog
Identity & Access Management
Oct 26, 2021
Controlling who or what can access critical business systems and data may seem like an obvious thing to do, but the continual cyber-attacks and breaches indicate that this is not being done very effectively by many organizations. It suggests that more attention needs to be paid to Identity & Access Management (IAM) and that most organizations need to raise their game. IAM is a core area of focus for KuppingerCole, so in the next few editions of KC Navigator, we will look at different aspect...
Event Recording
Tim Bedard: Mitigating Risks and Reducing Costs with IAM Hyperautomation
May 27, 2021
So, let me go ahead and, you know, start right out and just talk about what we're gonna be covering here today. So, you know, when we talk about over the next 20 minutes, I'm gonna take you in, on an identity journey and we're gonna discuss what market trends global organizations are facing today. What business problems they're encountering, what legacy I, you know, why legacy, identity solutions are falling short, how artificial intelligence and machine learning can help them redefine their ide...
Whitepaper
Identity & Security: Addressing the Modern Threat Landscape
Jul 12, 2022
Identity and Access Management (IAM) and Cybersecurity have for too long been separate disciplines with distinct solutions that have not interoperated optimally. This has put defenders at a disadvantage because malicious actors have increasingly made IAM solutions a primary vector of attack in their campaigns over the last several years. The best path forward for all organizations is to take a unified Identity & Security approach to increase efficiency and reduce mean time to detect threats and respond on time. In this paper, we will consider the innovative methods by which CrowdStrike, a...
Blog
IAM Maturity Check
Jan 18, 2022
The start of a new calendar year is typically the time for reviewing the status of things, and high on the list should be Identity and Access Management (IAM) and the related areas of Identity Governance and Administration (IGA), Consumer Identity and Access Management (CIAM), Cloud Infrastructure Entitlement Management (CIEM), and Dynamic Resource Entitlement and Access Management (DREAM), which is a paradigm for managing all access of everyone and everything to all resources consistently in a ...
Whitepaper
The Future of IAM Lies in the Cloud and as a Service
Jul 02, 2021
IAM software and tools have traditionally been installed and run on-premises by the organization itself. In recent years, the growth in identities operating across cloud and digital services has seen vendors offering IAM solutions as a service to assist with this growing complexity and concomitant security challenge. This IDaaS market, with its ease of adoption and cloud-native integrations, is slowly overtaking the on-premises IAM market. But even while the flexibility, security and scalability of IDaaS makes sense for many businesses, a third option is becoming popular. This is IDaaS...
Blog
The IAM Market: What is driving growth in 2023?
Apr 18, 2023
Identity and Access Management (IAM) is an essential component of IT security today, enabling organizations to control access to their systems and data by managing user identities, access entitlements and authentication. The importance of IAM continues to grow as cyber threats continue to evolve an
Whitepaper
A Shift Toward MSP Delivery: How MSPs Are Mitigating Enterprise IAM Delivery Challenges
Aug 31, 2023
Organizations face challenges in enterprise IAM delivery, including a shortage of experts, budget constraints, and difficulties in keeping up with industry changes. Fluctuations in IAM engagement lead to stress and reduced productivity. Insufficient transparency and prioritization cause financial losses. Organizations struggle to adapt to changing dynamics, impacting security and competitiveness. Uncertainty in decision-making hampers risk management. A strategic, adaptive approach to capacity planning is crucial to address these challenges effectively.
Webinar Recording
Identity Security: A Top Priority for the Modern Enterprise
Dec 15, 2021
Accelerated digital transformation has led to an explosion of digital identities, which means any user can have some level of privileged access at some time. Cyber attackers are targeting this rapidly expanding attack surface. This means identity security, has never been more important or challenging.
Leadership Brief
Transforming IAM – not Panicking
Aug 15, 2016
Many organizations are responding to incidents and audit failures by panicking and buying more point solutions. They need to take a more strategic approach to transform their IAM.
FAQ
Why should I register for a KuppingerCole webinar?
Join this combined presentation to gain quick insights and hands-on solutions from a KuppingerCole analyst and selected industry expert, finishing with by a comprehensive Q&A for your individual business challenges.
How can I register for this webinar?
To register for the webinar, you need to log in to your KuppingerCole account first. If you do not have an account yet, you can sign up here. After logging in, please enter your requested personal data which is necessary for the further administration of your registration. Once registered, a booking confirmation will be sent to your indicated e-mail address.
How long does the webinar last?
Our webinars last approximately 50-60 minutes.
I did not receive a booking confirmation. What can I do?
If you didn’t receive the booking confirmation in your inbox, please check your spam folder. If you cannot find the booking confirmation in your spam folder, please contact us. We will get back to you within one business day.
What technical equipment do I need?
To participate, you need a computer or a laptop with Internet access. If you want to use the sound transmission via the computer, you will need headphones (headset) or speakers. You do not need a webcam or microphone. You can type in questions in the chat window. In the registration confirmation you will also receive a link that allows you to test the technical requirements in advance.
What does it cost to attend?
Our webinars are generally free of charge.
When will the recordings and presentation slides be available? Will I get notified? How can I access them?
The recordings and presentation slides will be available on the website shortly after the webinar. An e-mail will be sent to all registered users. In order to access the materials, you will need to log in first.
I registered for the webinar, but unfortunately I was not able to attend live. Do I still get access to the recordings and presentation slides?
Yes, the recordings and presentation slides are made available to all users that registered for the webinar, regardless if they attended live or were tied up with business.