The world of corporate IT was profoundly altered in just days by COVID-19. Many things are likely to never return to the old normal. One of those is security, as dynamic work requires a Zero Trust approach to identities of users and their devices.
Like operations, security's goals of minimising enterprise risk sometimes seem to be at odds with development's mandate for change. In reality, there is a middle path that can allow development to deliver more secure code at DevOps speed, but it requires security to adapt to the principles that have proven successful...
Securing a remote workforce has never been more essential for today's Financial Institutions. Workers must remain productive wherever they are, but a poorly implemented solution will only add complexity and cost, eliminating many of the benefits of moving to the cloud.
As more users need remote and mobile access...
Many businesses have new and emerging financial and reputational risks with data access controls. The complexity of digitalization and newfound data science capabilities drive greater demand for data democratization. The diversity of data consumers, data assets and data access tools continue to grow. Businesses are...
Remote work is the new normal. In this new work-from-anywhere environment, how can IT leaders ensure always-on security while employees always have access to the business resources they need? IT needs to increase security to mitigate the risks associated with remote work, but to do so in a way that does not slow...
Companies today, big and small, are facing the same challenges of managing and securing identities while accessing systems remotely or otherwise. Increased cyber attacks and distributed workforces are creating new challenges that need innovative solutions. When transitioning to a fully remote or hybrid workforce,...
The world of IT is changing and evolving exponentially, and our customers are telling us that the expansion of the perimeter is making it harder to secure and keep track of privileged credentials. In many organizations exist tens of thousands of privileged accounts across thousands of devices. Understanding your...
As businesses settle into a hybrid world of on-prem, public cloud, private cloud infrastructure with security delivered as a service and all of this overlaid with the concept to Zero Trust, what is left? Companies will have the data they are trying to protect and the identity of the user trying to access something. As...
For organizations that want to ensure safe, scalable, and efficient access to their applications and services, identity is playing a bigger role than ever before. In this session, Mathias Conradt will discuss today's digital environment and how digital transformation is moving up on the agenda for C-level, and what...
Legislation and regulatory actions such as the European Union's Global Data Protection Regulation and California's Consumer Privacy Act reflect growing concerns over privacy in the digital world. Meanwhile, as security professionals seek to implement concepts such as the Zero Trust security framework, the need to...
The challenges of a rapidly growing mobile workforce coupled with the ever-rising demand to increase productivity have highlighted the need for greater precision in evaluating risk exposure and improving an organization's security posture. Despite these significant variables, a financial institution's most valuable...
In this exclusive session, David Temoshok, Senior Policy Advisor at the National Institute of Standards and Technology, will outline the current status of online identity as an attack vector and identity theft, as well as NIST Guidelines for Digital Identity Management. Included in this talk:
Multi-factor...
With the whole landscape of cybersecurity changing at an ever-increasing pace, today's CISO is faced with addressing talent short falls, emerging threat actors, leveraging new operational models and connected medical devices. The CISO continues to look for a balance of addressing good compute hygiene, searching for...
New York-Presbyterian Hospital CISO Jennings Aske describes his organization's COVID-19 security challenges and response, and the critical lessons learned while dealing with a pandemic in the nation's top hot spot for disease outbreak.
To remain productive and ensure needs are being met, organizations have vastly enabled video-conferencing and messaging as primary forms of communication in order to interact with patients and other healthcare professionals. By redefining the status quo, medical personnel have been able to handle lower risk health...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.