Women in Cybersecurity UNITE
We discuss the gender gap in the STEM fields and real ideas for how we
can help.
Presenters: Rima Pawar, VP of Product Management, One Identity
Stacey Blanchard, Senior Director of Sales Engineering, NAM, One
Identity
Allison Main, Senior Product Marketing Manager, One Identity
Active
Roles Roadmap and Use CasesHear about the latest releases of Active Roles, roadmap and use cases
with product management and development.
Presenters: Dan Conrad, PreSales Manager, One Identity
Frederic Courtois, Principal Solutions Architect, EMEA, One Identity
Master
Class: Getting the Most Out of OneLoginAre you using all the features available to you? Did you know that
OneLogin has supported Passwordless Authentication for over two years
now? How about that we now support Desktop MFA or can augment attributes
for a user by synchronizing from multiple directories?
We take you on a tour of the complete OneLogin offering and help you
understand new offerings to leverage the platform for better security
and greater automation.
Presenters: Mark Cockbill, Senior Access Management Solutions
Engineering Manager, One Identity
Daniel Gordon, Senior Solutions Engineer, One Identity
Identity
Manager TodayHear about the latest releases of Identity Manager, LTS option,
roadmap and use cases with product management and development.
Presenters: Matthias Bauer Senior Manager of Product Development, One
Identity
Ted Ernst, Senior Product Manager, One Identity
Privileged
Access Management TodayHear about the latest releases of the privileged solution family, our
product roadmap and use cases, presented by members of our product
management and development teams. In this session, our experts highlight
how the One Identity PAM portfolio provides Next-Gen PAM capabilities
and features. Plus, get the latest info about innovations and
integrations that ensure your PAM program can quickly adapt to evolving
technologies and emerging cybersecurity threats.
Presenters: Dan Peterson, Software Architect, One Identity
Alan Radford, Field Strategist, EMEA, One Identity
The
Future Evolution of ID Security: A Converged Identity Security Model is
Coming; Are You Ready?“Convergence, fabrics, unified;” just a few of the many
terms used to describe the current trend in managing identities in
today’s complex threat landscape. What should you be doing to
create and implement this type of security model for your own
organization’s unique environment?
Presenters: Robert Kraczek, Field Strategist, NAM, One Identity
Microsoft
AD Security: Preventing Pass-the-Hash Privilege Escalation with Active
Roles and SafeguardActive Directory is still the well-known attack vector for bad actors
attempting to exploit large organizations. Since AD touches almost
everything, and privileged accounts in AD can have far reaching impact,
it becomes an obvious target. When an attacker compromises a user
account or workstation, the next step is to elevate privileges. In this
session, we will demonstrate a Pass-the-Hash breach against privileged
accounts in Active Directory using common exploit methods and walk
through an Active Roles implementation specifically designed to mitigate
this vulnerability using Just-In-Time Privilege elevation. This Active
Roles/Safeguard integration is specifically designed to reduce the
vulnerabilities related to privilege escalation attacks and adds a Zero
Trust security layer to Active Directory.
Presenters: Dan Conrad, Presales Manager, One Identity
AJ Lindner, Solutions Architect, One Identity
OneLogin: The
Future of Access ManagementLearn about OneLogin’s product roadmap and most recent product
innovations. We showcase how these technology investments can be applied
in key use cases and how they can benefit your organization, including
custom authentication factors, dynamic responses to risk insights and
application-level branding controls.
Presenters: Mark Cockbill, Senior Access Management Solutions
Engineering Manager, One Identity
Stuart Sharp, VP of Product Strategy, One Identity
Customizing
the Identity Manager Web UIFrom simple configuration changes to fully customized applications,
Identity Manager’s new customization architecture is based on
established web development technologies. In this session, we will take
a look at how to set up a custom app and address some questions that can
arise over the lifetime of an application. Learn how the new HTML5-based
UI stack helps to ensure the success of your Access Management project
by benefiting developers and users alike.
Presenters: Hanno Bunjes, Product Development Team Lead, One Identity
How
Bosch Maintains a Worldwide Distributed Safeguard Environment and
Implements Changes/ExtensionsIn this session, we present an approach we use at Bosch Cyber Defense
Center to automate our environment in a scalable way.
Presenters: Robin Großnick, Cybersecurity Engineer, ETAS, Bosch
Cyber Defense Center Robin Rietgraf, Cybersecurity Engineer, ETAS, Bosch
Cyber Defense Center
Understanding Cyber Insurance: Who Needs
It and What Will You Need to Do to QualifyOver the last few years, ransomware and other attacks have brought
many household names to our news headlines and boardroom discussions.
These companies have incurred extremely damaging costs, both in actual
financial currency and in brand and confidence. With the number of
cyberattacks increasing, an emerging industry, Cyber Insurance, or Cyber
Liability, has become important for CISOs and CEOs to explore, evaluate
and understand. In this discussion, we come to understand the
fundamentals of Cyber Insurance, explore who needs it and dig into some
of the requirements you will need to fulfill to qualify for Cyber
Insurance.
Presenters: Stacey Blanchard, Senior Director of Sales Engineering,
NAM, One Identity
Multi-Factor Authentication to the Active
Roles MMC and Web UIsMulti-Factor Authentication is becoming a common security layer across
all levels of access control – because it works. It just makes
sense to add MFA to our critical enterprise applications, like Active
Roles. Removing system-provided delegation points in AD and setting up a
true least privilege delegation model is the core functionality of
Active Roles, so adding MFA to the admin interfaces ensures strong
authentication to the administration of the organization’s most
critical asset: Active Directory. In this session, we will walk you
through setting up the Active Roles web interfaces to use MFA and show
how to implement MFA to the Active Roles MMC (or any type of admin
interface) using Safeguard for Privileged Sessions.
Presenters: Richard Hosgood, PAM Principal PreSales Engineer, One
Identity
AJ Linder, Solutions Architect, One Identity
Leveraging
OneLogin in Your Unified Identity PlatformLearn how you can enhance your IGA, PAM and AD Mgmt implementation
with OneLogin solutions.
As part of the One Identity Unified Identity Security Platform,
OneLogin seamlessly integrates with Identity Manager (IGA), Safeguard
(PAM) and Active Roles (AD Mgmt), including behavior-driven governance
and integrated risk flows to dynamically set a user's security policy
based on both governance and authentication risk, and step-up
authentication via OneLogin MFA.
Presenters: Robert Byrne, Field Strategist, EMEA, One Identity
Stuart Sharp, VP of Product Strategy, One Identity
Access
Management Governance with OneLoginSee how Access Management and Identity Governance & Administration
(IGA) together are essential to protect all classes of users throughout
the identity lifecycle, including the authentication and authorization
needed when users access critical resources.
Presenters: Robert Kraczek, Field Strategist, NAM, One Identity
Markus Weiss-Ehlers, Program Manager Consultant, One Identity
VPN-Less
Privileged Access ManagementSee how to deliver safe and secure privilege access without the
hassles and overhead of a VPN and all within a browser. Get the latest
news, capabilities and plans for upcoming features of Safeguard Remote
Access with a demo of current functionality.
Presenters: Dan Peterson, Lead R&D Architect, PAM, One Identity
Workshop:
Unified Identity Platform: What Does it Mean to Your Business?Attendees workshop with our top technical executives to provide their
input on how One Identity’s solutions will affect their
organization and make it safer.
Presenters: Darren Thomson, VP of Product Marketing, One Identity
Rima Pawar, VP of Product Management, One Identity
Think
Like a Security Officer: Strategies to Protect Against AD BreachesLearn how a security officer approaches protection strategies to
remain vigilant and cut off the angles of potential attacks. Strong
policies must be implemented consistently and automated to mitigate risk
in your Active Directory strategy.
Presenters: Ian Stimpson, Principal Engineer, Presales, One Identity
Enhancing
Your Security Posture with Adaptive Risk TechnologiesGiven the increased risk associated with the rise of ‘access
anywhere’ and the growth of targeted attacks, more and more
organizations are looking to maximizing the use of adaptive risk
engines. More specifically, they are looking for ways to incorporate
additional information in their risk management systems, for example, by
integrating signals from PAM and IGA solutions or via richer signals
from endpoints. A key purpose of these external signals is to inform the
risk analysis driving dynamic authentication flows.
Find out what we have done to enable organizations to incorporate the
widest possible set of external signals and support a broader range of
authentication factors. External signals include ID Proofing,
third-party authentication factors, such as MFA, and a wide variety of
threat intelligence.
Presenters: Ted Ernst, Senior Product Manager, One Identity
Daniel Gordon, Senior Solutions Engineer, One Identity
Stuart Sharp, VP of Product Strategy, One Identity
CIEMOne Identity addresses Cloud Infrastructure Entitlement Management
(CIEM) at the intersection of IGA and PAM. IGA capabilities enhance
governance of cloud-platform authorizations and deliver crystal clear
visibility of cloud-infrastructure objects.
Presenters: Robert Byrne, Field Strategist, EMEA, One Identity
Dr. Stephan Hausmann, IGA Principal, One Identity
Privileged
Access Management On Demand SaaS Isn’t Just for TeenagersThe race to the cloud is driving everything and must include your PAM
strategy. Unfortunately, most traditional approaches to PAM don't easily
support cloud strategies. Will Mitchell discusses how a PAM program
supports cloud targets and digital transformation priorities. He also
demonstrates how it can be delivered in the ideal deployment for your
business – on-prem, hybrid or private cloud – to execute
your strategy efficiently and securely.
Presenters: Bruce Esposito, Field Strategist, NAM, One Identity
Will Mitchell, Product Manager, One Identity
Using
Artificial Intelligence to Mitigate and Reduce Risk Exposure Brought by
an IdentityIdentity is the new attack surface. As you have seen with cyberattacks
in the last few years, including sophisticated supply chain attacks,
ransomware attacks and others, the common denominator is targeting
identity.
Presenters: Hitcham Bouali, Sales Engineering Senior Manager, One
Identity
Getting the Most from Active Roles ImplementationImplementing Active Roles to provide stronger security and Zero Trust
requires a delicate balance of technology and artistry. You need build a
robust solution to grow with your organization but have policies and
procedures in place to make sure you don’t deviate from its
intended purpose. Since Active Roles allows you to implement security
policies and delegation at scale, it’s critical to follow some
guidelines to make sure it will support your growing organization.
In this session, we address this balance and how to optimize Active
Roles architecture, as well as features and functions to use (or not
use) to eliminate bottlenecks and ensure a secure and functional
implementation.
Presenters: Frederic Courtois, Principal Solutions Architect, EMEA,
One Identity
Zero Trust: Best Practices for Securing the
EnterpriseYou would be hard-pressed to find an IT or security leader who has not
heard of Zero Trust, not to mention the plethora of different vendors in
the security space claiming to be your one-stop shop for all things Zero
Trust.
The problem? Zero Trust is not a single product or solution, but
rather a mindset that includes a set of guiding principles for a modern
security strategy in today’s hyper digital world.
Join us as we delve into what Zero Trust really means, describe the
role Access Management plays in this model and look at strategies and
practical solutions for implementing the necessary technologies to help
you get started on your journey to Zero Trust.
Presenters: Mark Cockbill, Senior Access Management Solutions
Engineering Manager, One Identity
Alan Radford, Field Strategist, EMEA, One Identity
How Risk
Fits into IGALearn how you can benefit with knowledge of the broader security
ecosystem and increase security.
Presenters: Ted Ernst, Senior Product Manager, One Identity
Starling
Services for SafeguardGet an overview of how One Identity’s Starling Cloud services
can extend your Safeguard deployments. The following Starling components
will be covered during this session:
- Starling Connect for Passwords: Discover and manage privileged
accounts hosted in cloud-based services, such as Azure AD or AWS
- Starling Directory Proxy Services: Synchronize end-user identities
in Safeguard from Azure Active Directory
- Starling Remote Access: Provide VPN-less remote privileged access
from anywhere in the world, without compromising on security, with the
help of only a web browser
- Starling Connect for Safeguard Assets: Add support for disconnected
assets and mobile workstations (planned for Q4/2022)
Presenters: Richard Hosgood, Principal Systems Consultant, One
Identity
Ferenc Sipos, Director of Sales Engineering, One Identity
Please,
No More Security! We Fear Change!We’ve all seen the effects well planned security
“enhancements” have on our workforce. These effects range
from minor complaints to hostile workers refusing to comply with new
procedures. When our goal was to provide better physical protection for
the employees or protect work product and intellectual property, we must
be aware of how the end consumers of change understand and perceive the
change.
In this session, Dan Conrad shares from experience as a user, a
sysadmin and a security solution vendor the impacts security
enhancements have on populations. How the consumer of security accepts
the change is critical to the organizational and technical success of
the change. We can install a new lock on the door, but if the occupants
prop it open, the lock has failed. Dan discusses some of the reasons
improving security posture goes wrong or is avoided, as well as shares
some advice for steering things in the right direction to minimize push
back to stronger security.
Presenters: Dan Conrad, Presales Manager, One Identity
Integrating
Desktop Authentication and Cloud MFA for Strong Device SecurityProtecting identities and accounts is obviously critical to protect
the data they hold within them. Adding Multi-Factor Authentication
ensures a better security posture and reduces the likelihood of
successful account breach. If an organization has not implemented MFA
for their user population, it’s a bit like leaving your wallet or
purse on a park bench and expecting it to not be stolen.
Many organizations protect their cloud and on-premise applications
using MFA today, but what about MS Windows devices? By combining
Defender and OneLogin, cloud-based MFA can be used to further protect
desktop devices.
In this session, we show how to use OneLogin within your Defender
implementation to provide strong desktop authentication to AD and
authentication to cloud applications, while creating a seamless user
experience.
Presenters: Frederic Courtois, Principal Solutions Architect, EMEA,
One Identity
AJ Lindner, Solutions Architect, One Identity
OneLogin for
CIAM: Protecting Customer Identities with a Seamless Customer ExperienceLearn how to use OneLogin to centralize and secure your
customers’ access to applications. We also discuss what strategies
you should follow to define and implement your customer identity and
access management (CIAM) program.
Presenters: Mark Cockbill, Senior Access Management Solutions
Engineering Manager, One Identity
Stuart Sharp, VP of Product Strategy, One Identity
IGA +
SaaS = Cloud Your WayLearn what approaches to take to modernize your existing IGA program
and what you need to consider when
developing a modern IGA strategy with full identity governance
capabilities.
Presenters: Bruce Esposito, Field Strategist, NAM, One Identity
Will Mitchell, Product Manager, One Identity
Unleash the
True Power of SafeguardEnterprise IT environments can be extremely heterogenous, comprising
of technologies from legacy to cutting edge, but they all have one thing
in common: they all have privileged accounts that need to be protected.
Given this level of diversity, it is impossible to find a single PAM
solution that supports every system out of the box. That is why it is
imperative to pick a platform that provides users with the flexibility
to define how system-provided assets that are not supported should be
managed.
Join us for an overview of how Safeguard, through its extension
interfaces (Custom Platforms and Privileged App Auto-logon), can help
you enroll virtually any asset type into your PAM program.
Presenters: Ferenc Sipos, Director of Sales Engineering, One Identity
People,
They Deserve Governance TooThe actors in an enterprise are people. There may be internal,
external, temporary or other types of people. However, they all
participate in the processes and business operations of the enterprise
in different capacities. In this context, a person can occupy different
personas. As such, they need to be considered in the security
architecture of the enterprise. What are personas? How are they defined?
And above all, how must they be managed?
Presenters: Cengiz Tuztas, EMEA Presales Manager, One Identity
Move
from a Product-Focused Implementation to a Value-Driven AM ServiceLearn how to streamline process, reduce errors and minimize complexity
associated with managing digital identities.
Presenters: Artur Jozefiak, Managing Director – Security Lead
for Poland/CEE & Digital Identity Delivery Lead for Europe, Accenture
Bert Vanspauwen, Managing Director, Digital Identity Lead Europe,
Accenture