Big,Data.,Business,And,Digital,Technologies.,Data,Flow,In,A

Webinars to pollinate your perspective.

Upcoming Webinars
MFA Pass or Fail? How CISA, PCI, and the FBI Are Auditing MFA

A year ago, the multifactor authentication system your team designed and deployed fit your organization's needs perfectly... and sailed through the cybersecurity audit too. But adversaries are now smarter. TTPs are more broadly marketed, and MFA regulations are either already updated or about to be.

This webinar will highlight recent changes in both public and private sector cybersecurity regulations that impact MFA implementations. We'll explore new benchmarks for authentication methods, examine how some regulations have raised the standards for acceptable tokens and methods, and discuss the implications for organizations moving forward.

Additionally, we'll discuss how organizations can achieve enhanced security while simplifying the end-user experience by leveraging passwordless authentication methods such as Certificate-Based Authentication and FIDO2 standards.

Attendees will learn:

· How organizations like the FBI, PCI SSC, and CISA have updated their MFA recommendations to counter advanced threats.

· Why certain authentication methods—such as one-time passwords (OTPs), push notifications, and out-of-band messages—are now considered less secure and may not meet current compliance standards.

· The role of frameworks like FedRAMP and CMMC in guiding federal agencies and departments, including their limitations.

· How implementing passwordless authentication using certificate-based authentication CBA and FIDO2 can enhance security while simplifying end user experiences.

Read More ...
Stop Identity Attacks in Their Tracks: A Roadmap to Risk Reduction

In the last year, 90% of organizations have suffered identity breaches as cyber attacks involving identities grow more sophisticated and widespread1. Organizations rely heavily on their identity infrastructure to enable collaboration, remote work, and access to internal systems. But the complexity and room for gaps and errors in these systems make it an attractive target for threat actors, posing significant risks across all sectors.

To manage user identities and control access to resources, most organizations use identity and access management (IAM) systems. It's not enough. Analysis of these systems uncovered that 95%2 are misconfigured. These misconfigurations provide cybercriminals with opportunities to escalate privileges and leverage identities to further their attacks. While IAM systems are crucial to an organization's security strategy, they must be complemented by additional security layers to proactively combat these tactics. Identity threat detection and response (ITDR) can provide these additional layers, identifying risks and anomalies and detecting potential breaches early.

In this informational webinar, you will learn:

  • The current state of identity threats and the expanding identity attack surface
  • Why organizations benefit from identity threat prevention as well as detection and response
  • How ITDR can help safeguard against the escalating risks associated with identity threats
Read More ...