Where are you on the path to realizing Zero Trust security?
To realize the full potential of Zero Trust security, organizations must evolve from the policy-driven identity and access management (IAM) model that is common today, to an AI-powered model. With the rapid proliferation of data—all of the rich context about each user, device, and application in a business ecosystem—policies are exploding, requiring too much manual work for IT and security teams to keep up with, and making Zero Trust security an unreachable goal.
Machine learning is now making it possible for IAM systems to learn the typical digital behaviors of each user, ushering in what is now the era of contextual, adaptive single sign-on (SSO) and multi-factor authentication (MFA). The automation made possible through machine learning brings us one step closer to Zero Trust access and the promise of this security nirvana.
If AI-powered access control is the next step in the Zero Trust evolution, where are we in the journey towards this vision? How will AI change the way we understand and manage user behavior risk?
In this webinar, guest speaker Andras Cser, Vice President, and Principal Analyst, Security & Risk Management at Forrester Research, Inc., and Archit Lohokare, Chief Product Officer at Idaptive, will discuss where the industry is today in terms of Zero Trust maturity; perspectives on how it’s evolving in the realm of identity and access; and how AI will transform the way organizations can track and manage user behavior risk, ultimately eliminating this “risk” from business altogether.
Learn more about:
- How identity and access are critical to realizing the promise of Zero Trust security
- User behavior risk as a key component of the Zero Trust approach
- The Zero Trust maturity model: where we are today, and how to determine where your organization is on the path to maturity
SPEAKERS:
-
Redirecting to https://www.cyberark.com/resources/webinars/risky-business-how-to-take-the-risk-out-of-user-behavior-risk-using-zero-trust-access Redirecting to https://www.cyberark.com/resources/webinars/risky-business-how-to-take-the-risk-out-of-user-behavior-risk-using-zero-trust-access.Andras Cser
Vice President, Principal Analyst, Forrester, Inc.
Andras serves Security & Risk Professionals. He is a leading expert on identity management, access management, user account provisioning, entitlement management, federation, privileged identity management, and role design and management. Andras covers cloud security and enterprise fraud management, which have many synergies with identity and access management when an organization needs to protect against risk and wants to manage fraud appropriately. He helps clients develop enterprise strategies for creating business value through identity management, cloud security, and fraud management (full bio available here).
-
Redirecting to https://www.cyberark.com/resources/webinars/risky-business-how-to-take-the-risk-out-of-user-behavior-risk-using-zero-trust-access Redirecting to https://www.cyberark.com/resources/webinars/risky-business-how-to-take-the-risk-out-of-user-behavior-risk-using-zero-trust-access.Archit Lohokare
Chief Product Officer, Idaptive
Archit Lohokare is Chief Product Officer at Idaptive, where he is responsible for product strategy, driving innovation, and bringing new products and services to market. He transitioned over to Idaptive as it was spun-out from Centrify, where—as Vice President of Product Management—he led the Identity-as-a-Service (IDaaS) and Unified Endpoint Management product portfolio. Prior to Centrify, Archit was Vice President of Products at Optymyze, where he led the product management team responsible for the company’s Sales Performance Management and Sales Platform-as-a-Service SaaS and PaaS solutions, securing a Leadership position in the first Gartner Magic Quadrant report on Sales Performance Management along the way (full bio available here).