Active Roles Roadmap and Use
CasesHear about the latest releases of Active Roles, roadmap and use cases
with product management and development.
Presenters: Dan Conrad, Presales Manager, One Identity
Vipin Jain, Principal Product Manager, One Identity
OneLogin:
The Future of Access ManagementLearn about OneLogin’s product roadmap and most recent product
innovations. We will showcase how these technology investments can be
applied in key use cases and how they can benefit your organization,
including custom authentication factors, dynamic responses to risk
insights and application-level branding controls.
Presenters: Stuart Sharp, VP of Product Strategy, One Identity
Identity
Manager TodayHear about the latest releases of Identity Manager, LTS option,
roadmap and use cases with product management and development.
Presenters: Hanno Bunjes, Product Development Team Lead, One Identity
Ted Ernst, Senior Product Manager, One Identity
Privileged
Access Management TodayHear about the latest releases of the privileged solution family, our
product roadmap and use cases, presented by members of our product
management and development teams. In this session, our experts highlight
how the One Identity PAM portfolio provides Next-Gen PAM capabilities
and features. Plus, get the latest info about innovations and
integrations that ensure your PAM program can quickly adapt to evolving
technologies and emerging cybersecurity threats.
Presenters: Dan Peterson, Lead R&D Architect, PAM, One Identity
Alan Radford, Field Strategist, EMEA, One Identity
The
Heritage of PAMPresenters: Kris Zupan, Director of Security Services, Novacoast
Microsoft
AD Security: Preventing Pass-the-Hash Privilege Escalation with Active
Roles and SafeguardActive Directory is still the well-known attack vector for bad actors
attempting to exploit large organizations. Since AD touches almost
everything, and privileged accounts in AD can have far reaching impact,
it becomes an obvious target. When an attacker compromises a user
account or workstation, the next step is to elevate privileges. In this
session, we will demonstrate a Pass-the-Hash breach against privileged
accounts in Active Directory using common exploit methods and walk
through an Active Roles implementation specifically designed to mitigate
this vulnerability using Just-In-Time Privilege elevation. This Active
Roles/Safeguard integration is specifically designed to reduce the
vulnerabilities related to privilege escalation attacks and adds a Zero
Trust security layer to Active Directory.
Presenters: Dan Conrad, Presales Manager, One Identity
Eric Hibar Jr., Sales Engineer, Quest/One Identity
Master
Class: Getting the Most Out of OneLoginAre you using all the features available to you? Did you know that
OneLogin has supported Passwordless Authentication for over two years
now? How about that we now support Desktop MFA, or can augment
attributes for a user by synchronizing from multiple directories?
We’ll take you on a tour of the complete OneLogin offering and
help you understand new offerings to leverage the platform for better
security and greater automation.
Presenters: Mark Cockbill, Senior Access Management Solutions
Engineering Manager, One Identity
Jason Loveday, Solution Engineer, One Identity
Customizing
the Identity Manager Web UIFrom simple configuration changes to fully customized applications,
Identity Manager’s new customization architecture is based on
established web development technologies. In this session, we will take
a look at how to set up a custom app and address some questions that can
arise over the lifetime of an application. Learn how the new HTML5-based
UI stack helps to ensure the success of your Access Management project
by benefiting developers and users alike.
Presenters: Hanno Bunjes, Product Development Team Lead, One Identity
Starling
Services for SafeguardJoin us for an overview of how One Identity’s Starling Cloud
services can extend your Safeguard deployments. The following Starling
components will be covered during this session:
- Starling Connect for Passwords: Discover and manage privileged
accounts hosted in cloud-based services, such as Azure AD or AWS
- Starling Directory Proxy Services: Synchronize end user identities
in Safeguard from Azure AD
- Starling Remote Access: Provide VPN-less remote privileged access
from anywhere in the world, without compromising on security, with the
help of only a web browser
- Starling Connect for Safeguard Assets: Add support for disconnected
assets and mobile workstations (planned for Q4/2022)
Presenters: Richard Hosgood, PAM Principal Presales Engineer, One
Identity
Ferenc Sipos, Director of Sales Engineering, One Identity
The
Future Evolution of ID Security: A Converged Identity Security Model is
Coming: Are You Ready?“Convergence, fabrics, unified;” just a few of the many
terms used to describe the current trend in managing identities in
today’s complex threat landscape. What should you be doing to
create and implement this type of security model for your own
organization’s unique environment?
Presenters: Robert Kraczek, Field Strategist, NAM, One Identity
Multi-Factor
Authentication to the Active Roles MMC and Web UIsMulti-Factor Authentication is becoming a common security layer across
all levels of access control – because it works. It just makes
sense to add MFA to our critical enterprise applications, like Active
Roles. Removing system-provided delegation points in AD and setting up a
true least privilege delegation model is the core functionality of
Active Roles, so adding MFA to the admin interfaces ensures strong
authentication to the administration of the organization’s most
critical asset: Active Directory. In this session, we will walk you
through setting up the Active Roles web interfaces to use MFA and show
how to implement MFA to the Active Roles MMC (or any type of admin
interface) using Safeguard for Privileged Sessions.
Presenters: Richard Hosgood, PAM Principal Presales Engineer, One
Identity
AJ Linder, Solutions Architect, One Identity
Leveraging
Adaptive Risk Technologies to Enhance Security Posture Given the increased risk associated with the rise of ‘access
anywhere’ and the growth of targeted attacks, more and more
organizations are looking to maximizing the use of adaptive risk
engines. More specifically, they are looking for ways to incorporate
additional information in their risk management systems, for example by
integrating signals from PAM and IGA solutions or via richer signals
from endpoints. A key purpose of these external signals is to inform the
risk analysis driving dynamic authentication flows.
Join us to find out what we have done to enable organizations to
incorporate the widest possible set of external signals and support a
broader range of authentication factors. External signals include ID
Proofing, third-party authentication factors, such as MFA, and a wide
variety of threat intelligence.
Presenters: Mark Cockbill, Senior Access Management Solutions
Engineering Manager, One Identity
Stuart Sharp, VP of Product Strategy, One Identity
Access
Management Governance with OneLoginSee how Access Management and Identity Governance & Administration
(IGA) together are essential to protect all classes of users throughout
the identity lifecycle, including the authentication and authorization
needed when users access critical resources.
Presenters: Josh Karnes, Principal IAM Product Architect, One Identity
Robert Kraczek, Field Strategist, NAM, One Identity
Unleash
the True Power of SafeguardEnterprise IT environments can be extremely heterogenous, comprised of
technologies from legacy to cutting edge, but they all have one thing in
common: they all have privileged accounts that need to be protected.
Given this level of diversity, it is impossible to find a single PAM
solution that supports every system out of the box. That is why it is
imperative to pick a platform that provides users with the flexibility
to define how system-provided assets that are not supported should be
managed.
Join us for an overview of how Safeguard, through its extension
interfaces (Custom Platforms and Privileged App Auto-logon), can help
you enroll virtually any asset type into your PAM program.
Presenters: Ferenc Sipos, Director of Sales Engineering, One Identity
Please,
No More Security! We Fear Change!We’ve all seen the effects well planned security
“enhancements” have on our workforce. These effects range
from minor complaints to hostile workers refusing to comply with new
procedures. When our goal was to provide better physical protection for
the employees or protect work product and intellectual property, we must
be aware of how the end consumers of change understand and perceive the
change.
Dan Conrad and Rob Forbes share their experience as users, sysadmins
and security solution vendors the impacts security enhancements have on
populations. How the consumer of security accepts the change is critical
to the organizational and technical success of the change. We can
install a new lock on the door, but if the occupants prop it open, the
lock has failed. Dan and Rob discuss some of the reasons improving
security posture goes wrong or is avoided, as well as share some advice
for steering things in the right direction to minimize push back to
stronger security.
Presenters: Rob Forbes, Director of Zero Trust and Identity Services,
Stratascale
Dan Conrad, Presales Manager, One Identity
Women in
CybersecurityWe discuss the gender gap in the STEM fields and real ideas for how we
can help.
Presenters: Denise Collison, SVP, Public Sector, SHI
Lydia Payne-Johnson, Director of IT Security and Identity Management
and Risk, The George Washington University
Stacey Blanchard, Senior Director of Sales Engineering, NAM, One
Identity
Allison Main, Senior Product Marketing Manager, One Identity
Think
Like a Security Officer: Strategies to Protect Against AD BreachesLearn how a security officer approaches protection strategies to
remain vigilant and cut off the angles of potential attacks. Strong
policies must be implemented consistently and automated to mitigate risk
in your Active Directory and Azure AD strategy.
Presenters: Dan Conrad, Presales Manager, One Identity
OneLogin’s
Vital Role in Your Unified Identity PlatformLearn how you can enhance your IGA, PAM and ADMgmt implementation with
OneLogin solutions.
As part of the One Identity Unified Identity Platform, OneLogin
seamlessly integrates with Identity Manager (IGA), Safeguard (PAM) and
Active Roles (AD Mgmt), including behavior driven governance and
integrated risk flows to dynamically set a user's security policy based
on both governance and authentication risk, and step-up authentication
via OneLogin MFA.
Presenters: Robert Kraczek, Field Strategist, NAM, One Identity
Behavior-Driven
Risk MitigationIdentify risky behavior patterns and automatically reduce
vulnerability through an enhanced integration between Identity Manager,
OneLogin and Safeguard.
Presenters: Josh Karnes, Principal IAM Product Architect, One Identity
Secure
Your Critical Secrets with Frictionless DevOps IntegrationBuilding your applications, products and processes requires access to
critical resources and information. Learn how Safeguard can securely
integrate with your existing infrastructure, tools, technologies and
architecture without requiring your developers to change the way they
work. Proper credential management in DevOps processes protects against
supply chain risk.
Presenters: Dan Peterson, Lead R&D Architect, PAM, One Identity
A
Journey into Cyber Maturity: A Story About How a Nonprofit Discovered
its Cyber ImperativeMany of the conversations we have with customers are centered around
how to expand, extend or enhance their cyber program. We infer that our
customers “know” security, are technology-savvy at an
organizational level and have a clear understanding of what, where and
how to defend their organization.
The reality, however, is that many organizations do not have a defined
cyber defense strategy. Thanks to many of the sales folks at events like
One Identity UNITE, they will likely have several point products in
play, with no clear vision of why they have them, what they do for cyber
capability or if they are adding business value.
Such was the case for a large not-for-profit in Australia. Over the
years, they had all but purchased "one of everything" in terms of
security tools, having been convinced to do so by various "experts" and
consultants. Then the inevitable happened - a cyber event… and
everything changed.
In this session, Jason Loveday shares how we defined our cyber program
from scratch. Told from a practitioner's perspective, he walks through
how we used a risk-based approach to explain the problem to the business
and then continuously measured the value of the program in terms of the
reduction of that risk. He describes the selection of a framework, the
subsequent selection of key defenses and the ongoing measurement of
cyber maturity.
Presenters: Jason Loveday, Solution Engineer, One Identity
Active
Roles Sync Service: Automated Provisioning Do’s and Don’tsProvisioning in all forms can be a complex task with combinations of
connectors, scripts and workflows in any organization. The Active Roles
Sync Service simplifies the complex provisioning tasks between many
sources to provide stronger security in the end systems and flexibility
to configure rules to meet unique organizational needs. In this session,
Rich Lambert provides a detailed overview of the Active Roles Sync
Service and reviews its use cases. He dives into some terminology and
provisioning concepts to enable organizations to use a simplified
approach to provisioning, deprovisioning and reprovisioning using the
Sync Service. He covers concepts such as:
- Mapping Rules
- Synchronizing Passwords
- Workflow Steps
- Connection handlers vs step handlers
- Backsync tips and tricks
Presenters: Richard Lambert, Presales Product Architect, One Identity
OneLogin
CIAM: Protect Customer Identities and Deliver a Frictionless Customer
ExperienceLearn how to use OneLogin to centralize and secure your customer's
access to applications. We also discuss what strategies you should
follow to define and implement your Customer Identity and Access
Management (CIAM) program.
Presenters: Mark Cockbill, Senior Access Management Solutions
Engineering Manager, One Identity
Philip Hayes, Senior Sales Engineering Manager, One Identity
One
Identity Manager: Hidden GemsWe all know the major things that One Identity Manager is capable of.
There are many capabilities that already exist OOTB but not initially
used. This session takes some time to dig into some of the “hidden
gems” that are very cool and useful, but oftentimes forgotten.
Presenters: Ted Ernst, Senior Product Manager, One Identity
Robert Kraczek, Field Strategist, NAM, One Identity
VPN-Less
Privileged Access ManagementWork is no longer contained within the traditional corporate network.
Learn how to deliver safe and secure privileged access without the
hassles and overhead of a VPN, all within a browser. Learn how Safeguard
can manage credentials on systems that never connect to the corporate
network.
Presenters: Dan Peterson, Lead R&D Architect, PAM, One Identity
Aren’t
You Forgetting the Key to Observability? No Logs? No Breach?Expanding your visibility is a core concept to everything we do. The
reason is simple: there is real business value to knowledge and
information, from closing security gaps to tightening operational
efficiencies. But outside the hardened shell of identity, there is a
whole jungle of IT infrastructure that needs the same. A central log
management platform can help optimize costs, bring you performance and
customer data and offer you deep insights on your security posture. Join
this session and see why logs and log management is a critical piece of
every observability pipeline.
Presenters: Ferenc Sipos, Director of Sales Engineering, One Identity
Akos Zalavary, Product Management Consultant, One Identity
Getting
the Most from Active Roles ImplementationImplementing Active Roles to provide stronger security and Zero Trust
requires a delicate balance of technology and artistry. You need build a
robust solution to grow with your organization but have policies and
procedures in place to make sure you don’t deviate from its
intended purpose. Since Active Roles allows you to implement security
policies and delegation at scale, it’s critical to follow some
guidelines to make sure it will support your growing organization. In
this session, we address this balance and how to optimize Active Roles
architecture, as well as features and functions to use (or not use) to
eliminate bottlenecks and ensure a secure and functional implementation.
Presenters: Richard Lambert, Presales Product Architect, One Identity
Multi-Factor
Authentication from Desktop & CloudMulti-Factor Authentication (MFA) provides an additional layer of
protection, reducing the likelihood of a breach. While you may use MFA
to protect cloud and on-premises applications, how are your protecting
your desktops? One Identity MFA protects desktops and cloud
applications, offering you a single solution to help prevent breach
exposures, given the rise in remote working and shared workstation
environments, as well as aid you in meeting increased compliance and
regulatory requirements.
Presenters: Philip Hayes, Senior Sales Engineering Manager, One
Identity
Jason Loveday, Solution Engineer, One Identity
IGA + SaaS =
Cloud Your Way Learn what approaches to take to modernize your existing IGA program
and what you need to consider when developing a modern IGA strategy with
full identity governance capabilities.
Presenters: Bruce Esposito, Field Strategist, NAM, One Identity
Will Mitchell, Product Manager, One Identity
Safeguard for
SudoLearn how Safeguard for Sudo makes administering sudo across the
entire enterprise easy, intuitive and consistent, eliminating the
box-by-box management of sudo that is the source of so much inefficiency
and inconsistency.
Presenters: Wayne Beaudin, PAM Principal, One Identity
Understanding
Cyber Insurance: Who Needs It and What Will You Need to Do to Qualify
Over the last few years, ransomware and other attacks have brought
many household names to our news headlines and boardroom discussions.
These companies have incurred extremely damaging costs, both in actual
financial currency and in brand and confidence. With the number of
cyberattacks increasing, an emerging industry, Cyber Insurance, or Cyber
Liability, has become important for CISOs and CEOs to explore, evaluate
and understand. In this discussion, we come to understand the
fundamentals of Cyber Insurance, explore who needs it and dig into some
of the requirements you will need to fulfill to qualify for Cyber
Insurance.
Presenters: Stacey Blanchard, Senior Director of Sales Engineering,
NAM, One Identity