Join us as we talk about some of the trends that highlight the importance of multi-factor authentication (MFA) for protecting your workforce. While MFA is more widely deployed to better protect your applications and resources, these trends also highlight the inherent weaknesses of today’s MFA solutions.
We will review a strong authentication factor based on the FIDO2 standards that present its own challenges in balancing security against cost and productivity. Finally, we will address how to ensure you choose a modern authentication framework tailored to your business model and needs to develop a secure, cost-effective, and low-friction solution.
What you will learn:
- The critical role of MFA (and the factor you use) within your cybersecurity program
- The advantages of a strong authentication factor based on FIDO2
- Solving the risk management challenges of security vs. cost and productivity
- How to select a secure, cost-effective MFA solution
Join us as we talk about some of the trends that highlight the importance of multi-factor authentication (MFA) for protecting your workforce. While MFA is more widely deployed to better protect your applications and resources, these trends also highlight the inherent weaknesses of today’s MFA solutions.
We will review a strong authentication factor based on the FIDO2 standards that present its own challenges in balancing security against cost and productivity. Finally, we will address how to ensure you choose a modern authentication framework tailored to your business model and needs to develop a secure, cost-effective, and low-friction solution.
What you will learn:
- The critical role of MFA (and the factor you use) within your cybersecurity program
- The advantages of a strong authentication factor based on FIDO2
- Solving the risk management challenges of security vs. cost and productivity
- How to select a secure, cost-effective MFA solution
Entrust Data Protection Solutions are proud to introduce our new partner within EMEA - Sycomp, a global provider of innovative data centre, cloud and security services. This extended partnership will enable Sycomp to provide their customers across EMEA with an added level of security to protect critical business data and help meet compliance mandates.
With Covid-19 being a catalyst for most companies to adopt a more cloud-first approach we chose this as our first joint webcast topic. We all know the cloud offers the benefits of agility and scalability - but these benefits don’t come without their security challenges.
Join Entrust and Sycomp live on May 25 where we will provide a brief 101 on Hardware Security Modules (HSMs) and then discuss the top 6 use cases that are helping our customers secure both their journey to the cloud and their cloud data while maintaining control of all encryption keys:
• BYOK – Bring your own key to maintain control with Cloud Service Providers
• DKE - Double Key Encryption to protect your most sensitive Microsoft O365 assets
• Migrating data to the clouds, including using multiple cloud service providers
• Managing the proliferation of information silos, credentials and secrets using ready-made integrations for CyberArk, BeyondTrust, HashiCorp and Thycotic
• Deploying containers at scale utilizing high assurance crypto
• Encrypting virtualized workloads – but what do I do with all the keys?
The cloud is full of potential – but also unwanted risks and guests. Threat actors of all skill levels and intentions seek to disrupt, destroy and derail your utilization of cloud hosting for your critical data workloads. How do you defend against this menace? Join Armor and (ISC)2 on June 22, 2017 at 1:00PM Eastern for a discussion on securing and maximizing your cloud investment. We’ll examine the expertise needed, the need to share responsibilities, leveraging proven and emerging technologies and the role integration and automation plays.
In the cloud, every second counts. Attacks move at warp speed, and security teams must protect the business without slowing it down. Sysdig stops cloud attacks in real time, instantly detecting changes in risk with runtime insights, a unique AI architecture, and open source Falco. Sysdig delivers live visibility by correlating signals across cloud workloads, identities, and services to uncover hidden attack paths. By knowing what is running, teams can prioritize the vulnerabilities, misconfigurations, permissions, and threats that matter most. From prevention to defense, Sysdig helps enterprises move faster and focus on what matters: innovation.
Sysdig. Secure Every Second.
How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.
As the United States becomes more reliant on satellites for every day life such as ATMs and gas machines, cyber attacks are now occurring in space. Tune into to hear about what is on the horizon for space security and you.
The increasingly digitized and interconnected global supply chain has provided significant benefits to businesses. Unfortunately, it has also been seized upon by cyber threat actors to launch wide-scale attacks. In many cases, a single breach in the supply chain can allow attackers to access the systems and data of hundreds, or even thousands, of organizations, as incidents like Kaseya and SolarWinds have demonstrated. Clearly, looking after your own cybersecurity is no longer sufficient – security has to be watertight across all third parties too. In this session, a panel of experts will discuss the nature of supply chain attacks and actions organizations should take to strengthen cybersecurity across all suppliers.
Hear from IoT security experts to get your team on the right track. We’ll discuss:
- Why is it important to start with a secure hardware foundation for IoT products?
- What hardware and software security features should you look for in a secure platform?
- How is penetration testing an IoT product different from traditional IT systems?
- What lessons can be learned from IoT product penetration testing?
- What role can automated security analysis play in the product security lifecycle?
- What can a product team do today to get them on the road to security-by-design?