2023 Webinars On-Demand

Real Identity Security Compromises. Real Strategies to Resudce the Blast Radius
How do you prevent a wide-reaching breach? How do you detect threats to your business, contain them, reduce the impact radius, and improve the time to recover? Listen in as seasoned technologists from Bravura Security and Elastic strategize about best practices to manage high-stress security incidents, including actions that will increase protection for your organization. Companies at many levels of maturity can benefit from both threat detection and analysis which can drive automated response and mitigation to reduce the blast radius and get back to business as usual.
Watch Now%20(1).png)
How ChatGPT & AI Affect Your Identity Strategy
After the colossal LastPass data breach created a map for hackers on where to focus, organizations are starting to question the amount of trust they place in closed-source password management solutions, what to look for in a new solution, and what to do if their LastPass vault has been stolen. Exposed URLs from LastPass make it easier for hackers to identify users and launch phishing attacks against them. With AI like ChatGPT accelerating, the specter of next-gen phishing looms. With more convincing phishing emails, increased speed and efficiency, and even polymorphic malware code, an uncharted danger awaits just beyond the horizon.
Watch Now
Why Your Best Passwords Are No Password
Learn why passwords don’t really work and what you can do about it by eliminating the threat vector of passwords with a passwordless sign-in experience. During this webinar we will discuss: How to reduce the risk of compromised credentials by replacing traditional, tedious, and poorly adopted MFA methods and removing remembering passwords from the equation.
Watch now2022 Webinars On-Demand

MFA Unwrapped: Breaking Down Authentication Silos
Eliminate the Security Risk of Legacy MFA with True Passwordless AuthenticationLegacy multi-factor authentication has failed. CISA and OMB have issued directives that organizations should move to phishing-resistant MFA. As organizations deploy passwordless authentication to improve security and user experience, they must consider change management challenges. Ian Reay, VP of Engineering at Bravura Security, and Michael Rothschild, VP of Product Marketing at HYPR, discuss how to break down silos and best practices for moving toward passwordless authentication.
Watch Now
Control The Explosion of Decentralized Secrets
One of the leading causes of breaches and cyberattacks like ransomware is lost or stolen credentials and secrets. The shift to the hybrid office resulted in an explosion of unmanaged applications. Combined with typical poor password hygiene, there is a significant risk of shadow IT passwords becoming a loose thread to your cybersecurity posture. Recorded on May 12, 2022 (Registration required to access this webinar recording)
Watch Now
Cut Your Cybersecurity Risk with an Industry-Leading Password Safe
While compromised passwords remain the top cause of breaches and attacks, working from home and leveraging new tools has resulted in an explosion of new, decentralized employee passwords outside of the enterprise applications onboarded to your identity and privileged access management program.
Watch Now
Mind the Gap: Enterprise-Insider Secrets and Passwords are a Risk Beyond SSO and Privilege
The recent rising threat of organizational insiders being paid to help in cyberattacks combined with notoriously bad secret and password hygiene at an individual level is a cause for cybersecurity leaders to be concerned. While IT teams have focused on implementing strong SSO, password management, identity and even privileged access management solutions, the work-from-home world has caused shadow IT to explode.
Watch Now
Why Your Best Passwords Are No Password
Learn why passwords don’t really work and what you can do about it by eliminating the threat vector of passwords with a passwordless sign-in experience. During this webinar we will discuss: How to reduce the risk of compromised credentials by replacing traditional, tedious, and poorly adopted MFA methods and removing remembering passwords from the equation.
Watch now2021 Webinars On-Demand
Registration is required to access the webinar recordings.
- Plan Your Zero Trust Journey with Enhanced Identity Governance
April 13, 2021 - The Zero Trust Journey: Stepping Ahead with Identity and Privileged Access Management
March 11, 2021 - Why Higher Education Institutions Are Complementing Governance with a Key Business Enabler: Automation
March 4, 2021 - Modern Requirements & Solutions for Privileged Access Management
January 20, 2021 - Move Forward by Shifting Left: Move Forward by Shifting Left: Enabling Self-Service and First-Level Resolution in 2021
January 19, 2021
Archive
Note that registration is required.
- Hackers Use Automation
November 19, 2020 - Why Automation First Should be the #1 Approach
October 22, 2020 - The Only Singular Identity
October 20, 2020 - Best Practices from the Trenches for IAM Project Implementations
October 20, 2020 - KeyNote: Transform Your Security Culture with the new Bravura Security Fabric
October 20, 2020 - Balance the Scales of Security and Convenience
October 6, 2020 - How Security and Identity Fabrics Work to Help Improve Security
September 30, 2020 - Fragmented IAM Must Come Together To Solve New Challenges
September 15, 2020 - Set your IAM Implementation Strategy
July 30, 2020 - Mitigating the Security Risks of a Remote Workforce During a Crisis
June 11, 2020 - Dealing with Identity Management challenges within the Covid-19 crisis
May 6, 2020 - Securing Privileged Access in Healthcare
March 26, 2020 - Which Comes First Identity Automation or Governance
January 24, 2020
Note that registration is required.
- Implementing an IAM Program isn't scary
October 17, 2019 - Introducing Privileged Access Management with Identity Experts
July 3, 2019 - ITSM vs IAM: When is the Right Time?
April 25, 2019 - Spent Millions on IAM and all you got was Access Certification?
February 28, 2019
Note that registration is required.
- Best Practices for IAM Assessments, Blueprints & Roadmaps
October 4, 2018