Securing a remote workforce has never been more essential for today's Financial Institutions. Workers must remain productive wherever they are, but a poorly implemented solution will only add complexity and cost, eliminating many of the benefits of moving to the cloud.
As more users need remote and mobile access...
Remote work is the new normal. In this new work-from-anywhere environment, how can IT leaders ensure always-on security while employees always have access to the business resources they need? IT needs to increase security to mitigate the risks associated with remote work, but to do so in a way that does not slow...
Many businesses have new and emerging financial and reputational risks with data access controls. The complexity of digitalization and newfound data science capabilities drive greater demand for data democratization. The diversity of data consumers, data assets and data access tools continue to grow. Businesses are...
Companies today, big and small, are facing the same challenges of managing and securing identities while accessing systems remotely or otherwise. Increased cyber attacks and distributed workforces are creating new challenges that need innovative solutions. When transitioning to a fully remote or hybrid workforce,...
The world of IT is changing and evolving exponentially, and our customers are telling us that the expansion of the perimeter is making it harder to secure and keep track of privileged credentials. In many organizations exist tens of thousands of privileged accounts across thousands of devices. Understanding your...
As businesses settle into a hybrid world of on-prem, public cloud, private cloud infrastructure with security delivered as a service and all of this overlaid with the concept to Zero Trust, what is left? Companies will have the data they are trying to protect and the identity of the user trying to access something. As...
In this exclusive session, David Temoshok, Senior Policy Advisor at the National Institute of Standards and Technology, will outline the current status of online identity as an attack vector and identity theft, as well as NIST Guidelines for Digital Identity Management. Included in this talk:
Multi-factor...
The challenges of a rapidly growing mobile workforce coupled with the ever-rising demand to increase productivity have highlighted the need for greater precision in evaluating risk exposure and improving an organization's security posture. Despite these significant variables, a financial institution's most valuable...
Legislation and regulatory actions such as the European Union's Global Data Protection Regulation and California's Consumer Privacy Act reflect growing concerns over privacy in the digital world. Meanwhile, as security professionals seek to implement concepts such as the Zero Trust security framework, the need to...
For organizations that want to ensure safe, scalable, and efficient access to their applications and services, identity is playing a bigger role than ever before. In this session, Mathias Conradt will discuss today's digital environment and how digital transformation is moving up on the agenda for C-level, and what...
With the whole landscape of cybersecurity changing at an ever-increasing pace, today's CISO is faced with addressing talent short falls, emerging threat actors, leveraging new operational models and connected medical devices. The CISO continues to look for a balance of addressing good compute hygiene, searching for...
New York-Presbyterian Hospital CISO Jennings Aske describes his organization's COVID-19 security challenges and response, and the critical lessons learned while dealing with a pandemic in the nation's top hot spot for disease outbreak.
To remain productive and ensure needs are being met, organizations have vastly enabled video-conferencing and messaging as primary forms of communication in order to interact with patients and other healthcare professionals. By redefining the status quo, medical personnel have been able to handle lower risk health...
The biggest challenge for practitioners today is to enable greater flexibility for a remote workforce while being fully compliant and secure. The "zero trust" model can play a critical role, but implementing it is a daunting task, and there's no "one size fits all" approach to making the transition to a zero trust...
Bil Harmer, CISO and Chief Evangelist at SecureAuth and Dan Dunstedter, Data Security/HIPAA Security Officer of Phelps Health, discuss why security teams need to increase the level of protection used to secure valuable and highly sensitive information and how they have implemented the highest level of authentication...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.in, you agree to our use of cookies.