Cybersecurity Webinar Playlist
Continuous Security in the Cloud
Cloud has opened unprecedented agility and scalability opportunities for businesses and allowed them to dramatically expand global reach.
That’s why more and more organizations are embarking on cloud journeys—an IT service with a worldwide end-user spend growth of 20% and nearly $500 billion in 2022, according to a Gartner forecast.
However, the cloud has also opened an entirely new threat vector, expanding the attack surface exponentially.
Join this panel discussion, where industry experts from NTT DATA, Microsoft and Cloud Security Alliance discuss the complexities of cloud security, cloud security posture drift, automation risk mitigation measures and many others.
Sushila Nair, cybersecurity portfolio leader at NTT DATA, leads a panel of business technology and security leaders who reveal what it all means for you.
What You’ll Learn:
- Why cloud security risks may be clear, but the attack surface scale is not
- How organizations can ensure cloud environments are secure
- How to know what a well-secured environment looks like
Customer Identity and Access Management (CIAM)
The implementation of CIAM at the intersection of security, customer experience, and analytics may not be straightforward, but it's a fool-proof way of impacting top-line revenue by minimizing bottom-line cyber risks. And the market is flooded with too many solutions claiming to serve CIAM for all edge cases – but not every tool supports all the features needed by an organization.
Moreover, specialized features like privacy and consent management, identity analytics and identity proofing are often caught up with integration challenges
During this session, industry experts from NTT DATA, Okta / Auth0 and Cloud Security Alliance discussed how to navigate the complexities of CIAM for organizations trying to provide frictionless and secure experiences to their end users. Join our distinguished panel made up of Sushila Nair, Ramesh Gupta, Carlo Baia, Mike Pastor and John Yeoh as they share their vast knowledge and experience.
What You’ll Learn:
- The emergence of CIAM in the digital-first world
- How enterprises can deliver seamless, secure digital experiences to customers and partners with CIAM
- How CIAM can bridge security gaps and manage identity without compromising on UX