Windows IT Pro
Modern IT Security & Identity Management: Mobile, On Premises, Cloud

Tuesday, July 29, 2014 11:00am ET


Modern IT Security & Identity Management: Mobile, On Premises, Cloud
(All times Eastern)
11:00 a.m. – 12:00 p.m. Retail Hacks – Lessons Learned for All
Presented by: Orin Thomas


The massive retail industry hacks – involving Target, Neiman Marcus and more – have a common thread: Malicious email and weak links between big retailers and outside contractors. Join us as we dissect IT security lessons learned from the recent Retail Hacks.

Sponsored by Imanami
Imanami
12:00 p.m. – 12:15 p.m. Networking Break
12:15 p.m. – 1:15 p.m. Partner Presentation

Sponsored by:
AvePoint

An Automated Strategy for Governance, Risk and Compliance and Data Loss Prevention
Presented by: Dana Louise Simberkoff


Organizations worldwide are constantly looking for new and innovative ways to organize and manage their content and knowledge in order to facilitate collaboration while reducing costs. However, these central information repositories may also become a treasure-trove of potentially sensitive and unprotected information. This leaves companies at risk for inappropriate disclosure from a well-intentioned employee, but also a potential target for attack and cyber-threat. With the increase of cyber security risks and information breaches, it is imperative that compliance, governance, and cyber assurance solutions for your collaboration systems are strongly established and sustained.

How do we balance the business benefit of the free flow of information with the risk of inappropriate access and disclosure? This session will examine the best practices for implementing a comprehensive and automated program that mitigates the risk of data loss, privacy and security breaches.
12:15 p.m. – 1:15 p.m. Partner Presentation

Sponsored by:
Centrify

Provisioning and Single Sign-On for Office 365
Presented by: Corey Williams


Office 365 is the fastest-growing product in Microsoft history, and it's suite of cloud apps is what many customers are using to take their first steps into cloud computing. Office 365 customers want to continue to use Active Directory as their primary identity store, and Microsoft provides ADFS for federation and DirSync for user provisioning – both of which add complexity, delay, and frustration. Join us for this live, interactive presentation, demonstration and Q&A to learn how Centrify gets you past the hurdles of deploying Office 365 with a cost-effective, Microsoft-validated solution that doesn’t require Microsoft ADFS or DirSync. In addition, learn how Centrify delivers provisioning and full lifecycle management with secure SSO for a rich catalog of pre-integrated SaaS, mobile and on-prem apps, and mobile management, policy & multi-factor authentication.
12:15 p.m. – 1:15 p.m. Partner Presentation

Sponsored by:
Ping Identity

Beyond the Firewall
Presented by: David Gorton


Recent technological and user trends have reshaped the business landscape --- highlighting the role of identity and the need for security beyond the firewall. Cloud-apps, application programming interfaces (APIs), BYOD, demands for improved external access, and private and public cloud deployments all need improved identity security. To utilize and address these with success, both business and IT need to be agile. However, traditional identity and access management (IAM) systems are unable to fully secure the enterprise in a cloud environment and have slowed responsiveness.

In this webinar we will discuss:
  • Four trends that have changed the business landscape and are driving the need for improved IAM security technology
  • Why current IAM systems are insufficient
  • How the new architectural model of IAM addresses new trends and secures the enterprise beyond the firewall.
1:15 p.m. – 1:30 p.m. Networking Break
1:30 p.m. – 2:30 p.m. SaaS and IAM: Killer Combo?
Presented by: Sean Deuby


As businesses begin to blend cloud applications with on-premises applications, the world of Identity and Access Management (IAM) becomes increasingly complex. Can corporate IT still empower employees with single sign on (SSO) even while they manage complex security requirements across multiple platforms and locations? We’ll explore the issues and answers.
2:30 p.m. – 2:45 p.m. Networking Break
2:45 p.m. – 3:45 p.m. Cloud SLAs and Security: What to Look For
Presented by: Orin Thomas


As IT pros consider moving some workloads to public clouds, they’ll need to tackle numerous security and compliance questions. Meanwhile, cloud services providers are trying to balance control, visibility and cost when addressing security with customers. This session will share the latest cloud security trends, what to look for in an SLA (services level agreement) and how businesses can best safeguard their data on public clouds.
3:45 p.m. – 4:30 p.m. Ask the Expert Chat Session

Join Sean Deuby for an interactive chat session as he answers questions from the audience.
4:30 p.m. Event Concludes

Event Registration

If you have already registered, click here to access

Not You? Please clear your cookies and refresh this page

 
 
 
 
 
 
 
 
 
 




I agree to the terms of use of this site including the privacy statement.
Your contact information will be shared with event sponsors.
By registering for the conference you agree the this disclosure.