Compliance and Security: Protecting Cri...
The complexity of securing critical applications that span multiple legacy systems and new cloud applications are creating new risks for government agencies that need to scale quickly. With an eye on resourcefulness, many IT departments have created workarounds that have been exposed.During this webinar, the speakers will:Outline IT challenge gaps that have inadvertently and adversely impacted security within some departmentsWalk through how M...
Zero Trust Privilege Virtual Lunch & Learn
Organizations continue to struggle with the ability to answer the fundamental questions: "who has access to what" and "how is that access being used". To address this challenge, Centrify and SailPoint Technologies have partnered to integrate the industry-acclaimed Centrify Privileged Access Service with SailPoint's market-leading identity governance platform. The combined solution, and how it can help organizations improve their security postu...
Zero Trust Privilege Virtual Lunch & Learn
Organizations continue to struggle with the ability to answer the fundamental questions: "who has access to what" and "how is that access being used". To address this challenge, Centrify and SailPoint Technologies have partnered to integrate the industry-acclaimed Centrify Privileged Access Service with SailPoint's market-leading identity governance platform. The combined solution, and how it can help organizations improve their security post...
Identity Governance Forum - The Evoluti...
This year the pivot to virtual work happened practically overnight. It was unprecedented and it was mandatory. It was also enlightening. The Evolution of Identity governance forum will dive into how the past few months have revealed the critical role identity plays into security.As government agencies move to modernize identity to support digital transformation and adapt to new missions, they must look across their complete portfolio of identi...
December 8-10, 2020
Organizer:
SailPoint Location:
Virtual
Addressing Cloud Vulnerabilities with V...
Federal agencies are rapidly adopting cloud infrastructure including Amazon Web Services (AWS), Microsoft Azure or Google Cloud Platform and they are realizing the enormous benefits. But without the right visibility and control, organization could quickly become vulnerable to risk.They are taking advantage of matching the requirements of each use case to the unique strengths of each cloud platform. What these agencies lack, however, is a way t...
September 14, 2020
Organizer:
SailPoint Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.