www.scworld.com Open in urlscan Pro
2606:4700:20::681a:446  Public Scan

Submitted URL: https://go.cyberriskalliance.com/dc/YGRCM_UB2YEs5cWbXsEsXXHAM0SFF_mjSuOjn2kvZaBJVuRh7SQ3pSBmhqLk_xI8-Zs1DSG5Gift-N-56dWKANU2vLafI...
Effective URL: https://www.scworld.com/cybercast/frictionless-identity-and-access-management-securing-the-digital-journey-of-the-identi...
Submission: On November 08 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

<form class="w-100" scmag-registration="set">
  <div class="my-2 font-body"><label for="email" class="visually-hidden form-label col-form-label col">Business Email</label><input placeholder="Business Email*" autocomplete="work email" required="" type="email" id="email"
      class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="my-2 font-body"><label for="firstName" class="visually-hidden form-label col-form-label col">First Name</label><input placeholder="First Name*" autocomplete="given-name" required="" type="text" id="firstName"
      class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="my-2 font-body"><label for="lastName" class="visually-hidden form-label col-form-label col">Last Name</label><input placeholder="Last Name*" autocomplete="family-name" required="" type="text" id="lastName"
      class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="my-2 font-body"><label for="companyName" class="visually-hidden form-label col-form-label col">Company Name</label><input placeholder="Company Name*" autocomplete="organization" required="" type="text" id="companyName"
      class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="my-2 font-body"><label for="jobTitle" class="visually-hidden form-label col-form-label col">Job Title</label><input placeholder="Job Title*" autocomplete="organization-title" required="" type="text" id="jobTitle"
      class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="mb-4">
    <div>
      <div class="Checkbox_checkbox__yB_sk form-check"><input type="checkbox" id="ssoEditorialNewsletters" class="form-check-input"><label title="" for="ssoEditorialNewsletters" class="form-check-label">Yes, I would like to receive industry news
          alerts, the Daily Scan, and editorial updates from SC Media.</label></div>
    </div>
    <div>
      <div class="Checkbox_checkbox__yB_sk form-check"><input type="checkbox" id="ssoLearningNewsletters" class="form-check-input"><label title="" for="ssoLearningNewsletters" class="form-check-label">Yes, I would like to receive information about
          upcoming SC Media events, webcasts, and conferences.</label></div>
    </div>
  </div>
  <div class="fs-9 my-4 px-1">
    <p>By clicking the Register button below, you agree to <span class="text-nowrap">SC Media<!-- --> </span><a class="text-underline" target="_blank" href="https://www.cyberriskalliance.com/terms-of-use">Terms of Use</a><span> and
      </span><a class="text-underline" target="_blank" href="https://www.cyberriskalliance.com/terms-of-use#privacy-policy">Privacy Policy</a>.</p>
  </div><button type="submit" class="btn btn-primary">Register</button>
</form>

Text Content

Log inRegister
CISO Stories
Topics
Topic Hubs
Events
Podcasts
Research
Recognition
About
Open Search Bar
November
21
2:00 PM ET


FRICTIONLESS IDENTITY AND ACCESS MANAGEMENT: SECURING THE DIGITAL JOURNEY OF THE
IDENTITY

Live Webcast|1 hour

The contemporary enterprise is seeing a proliferation of new identities across
the board, with increasingly complex and diverse environments. At the same time,
we’re seeing new attack vectors, often fueled by AI, increase the risk of those
identities and environments. Securing against these attacks without introducing
unnecessary friction for workforce and high-risk users is getting increasingly
challenging. While traditional Identity and Access Management (IAM) technologies
play a critical role in enabling seamless access while safeguarding assets, they
often do not account for the fact that every workforce user can be privileged at
certain points during their digital journey. This webinar will dive deep into
strategies for developing a frictionless IAM framework that assumes every user
can become privileged and accounts for every phase of the identity’s digital
journey —from the time the user is provisioned and granted certain roles, as
they access their endpoints, browsers and applications, to the time when they
transition out of the organization.
 
Join our experts as we explore key technologies, methodologies, and best
practices to ensure that your IAM strategy not only secures your organization
but enhances user experience. We will discuss identity governance, automation,
access provisioning, and continuous monitoring, all while maintaining regulatory
compliance. Attendees will leave with actionable insights on how to manage
identities efficiently, minimize risk, and streamline access processes across
their organization.


SPEAKERS

Archit Lohokare
General Manager, Workforce and Endpoint Security Solutions
CyberArk

With over two decades of experience as a senior enterprise software product and
strategy executive, Archit Lohokare leads the Workforce and Endpoint security
business at CyberArk as its General Manager. CyberArk is the global leader in
Identity Security, offering the most comprehensive portfolio of products and
solutions to protect the identities of people, applications, and machines across
cloud and hybrid environments. Archit’s mission is to envision and build
products that solve complex business problems, mitigate cyber risk, and create
value for customers.
Archit joined CyberArk in May 2020 through the acquisition of Idaptive, where he
was the Chief Product Officer and a member of the executive leadership team. At
Idaptive, he delivered Next-Gen Access, a zero-trust approach that converges
single sign-on, adaptive multi-factor authentication, enterprise mobility
management, and user behavior analytics. Prior to Idaptive, Archit was the Vice
President &amp; GM of Products at Optymyze, driving the product strategy and
roadmap for its SaaS applications and PaaS in the Sales Performance Management
space. Archit has also held product leadership roles at Symantec and IBM, where
he launched new innovations in the security and access management domains.
Archit holds an MBA from UC Berkeley-Haas School of Business and a bachelor’s
degree in computer engineering from NTU, Singapore.

Dustin Sachs
Chief Technologist and Sr. Director of Programs
CyberRisk Collaborative

Dr. Dustin Sachs is the Chief Technologist and Sr. Director of Programs at
CyberRisk Collaborative.  He is a highly accomplished cybersecurity professional
with a proven track record in risk management, compliance, incident response,
and threat mitigation.  He is CISSP-certified and holds a Doctor of Computer
Science (DCS) degree in Cybersecurity and Information Assurance.  Dr. Sachs has
worked in various industries, including public utilities, food distribution, and
oil and gas.  He is a respected thought leader in the cybersecurity community.


SPONSORS


Business Email
First Name
Last Name
Company Name
Job Title
Yes, I would like to receive industry news alerts, the Daily Scan, and editorial
updates from SC Media.
Yes, I would like to receive information about upcoming SC Media events,
webcasts, and conferences.

By clicking the Register button below, you agree to SC Media Terms of Use and
Privacy Policy.

Register

--------------------------------------------------------------------------------

ABOUT US

SC MediaCyberRisk AllianceContact UsCareersPrivacy

GET INVOLVED

SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us

EXPLORE

Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2024 CyberRisk Alliance, LLC All Rights Reserved. This material may
not be published, broadcast, rewritten or redistributed in any form without
prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy
Policy and Terms of Use.

COOKIES

This website uses cookies to improve your experience, provide social media
features and deliver advertising offers that are relevant to you.

If you continue without changing your settings, you consent to our use of
cookies in accordance with our privacy policy. You may disable cookies.

Accept cookies