www.cshub.com Open in urlscan Pro
52.23.1.25  Public Scan

Submitted URL: http://app.connect.awspls.com/e/er?s=893759278&lid=74945&elqTrackId=8C9E41EFBD60F23F5CC4E70A424D8565&elq=aa6bf85b473349c2bcacb...
Effective URL: https://www.cshub.com/executive-decisions/webinars/security-by-design-in-digital-transformation?utm_campaign=CSIQ-CD-2...
Submission: On September 21 via api from SG — Scanned from DE

Form analysis 3 forms found in the DOM

GET https://www.cshub.com/search

<form method="GET" action="https://www.cshub.com/search">
  <div class="input-group col-md-12 pr-0">
    <input id="query-input" name="q" type="text" class="search-query form-control" placeholder="Search..." style="padding: 0.375rem 0.75rem;">
    <span class="input-group-btn">
      <button class="input-group-text" style="background: none; border: none; padding: 0.375rem 0.75rem;" id="searchPrepend"><i class="fas fa-search"></i></button>
    </span>
  </div>
</form>

GET https://www.cshub.com/search

<form method="GET" action="https://www.cshub.com/search">
  <div class="input-group col-md-12 pr-0">
    <input id="query-input" name="q" type="text" class="search-query form-control" placeholder="Search..." style="padding: 0.375rem 0.75rem;">
    <span class="input-group-btn mt-2">
      <button class="input-group-text" style="background: none; border: none; padding: 0.375rem 0.75rem;" id="searchPrepend"><i class="fas fa-search"></i></button>
    </span>
  </div>
</form>

POST https://www.cshub.com/register/email?ty-pej

<form action="https://www.cshub.com/register/email?ty-pej" method="post">
  <input type="hidden" name="_token" value="lPZNnMHmc1Y1JWZdgHkAWGvV7WbZ5uZINqfK8ikq">
  <div class="form-group col-12 mb-1">
    <input type="text" name="email" class="form-control text-center rounded-0" placeholder="Business Email" required="" value="">
  </div>
  <div class="form-group col-12">
    <button type="submit" class="btn btn-info btn-block rounded-0 text-uppercase">Subscribe</button>
  </div>
</form>

Text Content

×
Cyber Security Hub
IQPC Digital
Get - On the Play Store
INSTALL

 * Content
   Articles Case Studies Demos Interviews News Podcasts Reports Videos
   Whitepapers
 * Events
   Conferences Exchanges Online Events Webinars
 * My Network
 * Sponsorship
   Media Kit Contact Us
 * About
   About Us About Membership Elite Sponsors Partners Contributors Contact Us
   Advisory Board
 * 
 * Sign In
 * Get Started

 * Content
   Articles
   Case Studies
   Demos
   Interviews
   News
   Podcasts
   Reports
   Videos
   Whitepapers
 * Events
   Conferences
   Exchanges
   Online Events
   Webinars
 * My Network
 * Sponsorship
   Media Kit
   Contact Us
 * About
   About Us
   About Membership
   Elite Sponsors
   Partners
   Contributors
   Contact Us
   Advisory Board
 * Sign In
 * Sign Up


Attacks Cloud Data Executive Decisions IoT Malware Mobile Network Security
Strategy Threat Defense
Filter Categories
Attacks Cloud Data Executive Decisions IoT Malware Mobile Network Security
Strategy Threat Defense


SECURITY BY DESIGN IN DIGITAL TRANSFORMATION


TAKE A DEEP DIVE INTO HOW BUPA’S PROGRAMMATIC APPROACH TO PRIVILEGE ACCESS
MANAGEMENT FUELED ITS DIGITAL TRANSFORMATION

How ongoing improvement and effective change management can help uplift a
company's security posture

Register

--------------------------------------------------------------------------------

This webinar will take place on:
22 September, 2021
11:00 AM - 12:00 PM SGT
Add To Calendar
Outlook / iCal Outlook Web Google Yahoo
AddThis Sharing Buttons
Share to FacebookFacebookShare to TwitterTwitterShare to LinkedInLinkedInShare
to EmailEmailShare to PrintPrintShare to MoreAddThis

--------------------------------------------------------------------------------

As digitalization accelerated over the last 18 months, cyber risk has rocketed
to the top of the risk register for many organizations. With an amazing amount
of data being shared as part of the digital transformation journey, the question
of securing assets and access to underlying systems needs to be addressed.

Identity and Access Management plays an increasingly important role in this
context and the role of privileged access to key data and secrets needs to be
properly assessed. The reality is that the growing importance of data as a
corporate asset is increasing. We deep dive into how Bupa’s programmatic
approach to privilege access management fueled their digital transformation in a
highly regulated industry. We look at how ongoing improvement and effective
change management helped in uplifting their security posture and in developing a
single pane of glass to manage identities and roles based access.

 * Understanding the business conditions in a highly regulated industry
 * Insights into aligning digital transformation with IAM at Bupa
 * Lessons learned from a programmatic approach to Privilege Access Management /
   Identity Security
 * Considerations on the changing role of privileged access to data and secrets
   in an organization
   

--------------------------------------------------------------------------------

Speakers

Thomas Fikentscher
Regional Director, ANZ
CyberArk
Michael Freeman
Security Manager, Identity and Access, Technology Security Platform
Bupa

Sponsor

--------------------------------------------------------------------------------

Register

FIND CONTENT BY TYPE

 * News
 * Case Studies
 * Interviews
 * White Papers
 * Videos
 * Podcasts

CYBER SECURITY HUB
COMMUNITY

 * Power10
 * About Us
 * Contact Us
 * Become a Member Today
 * Advertise with us
 * Cookie Policy
 * User Agreement
 * Become a Contributor

ADVERTISE WITH US

Reach Cyber Security professionals through cost-effective marketing
opportunities to deliver your message, position yourself as a thought leader,
and introduce new products, techniques and strategies to the market.

LEARN MORE

JOIN THE CYBER SECURITY HUB
COMMUNITY

Join CSHUB today and interact with a vibrant network of professionals, keeping
up to date with the industry by accessing our wealth of articles, videos, live
conferences and more.

SIGN UP TODAY!

Cyber Security Hub, a division of IQPC
© 2021 All rights reserved. Use of this site constitutes acceptance of our User
Agreement and Privacy Policy.

Careers With IQPC | Contact Us | About Us | Cookie Policy

 *  
 *  
 *  
 *  
 *  


×


Become a Member today!

PLEASE ENTER YOUR EMAIL TO JOIN FOR FREE

Subscribe

Already an IQPC Community Member?
Sign in Here or Forgot Password
Sign up now and get FREE access to our extensive library of reports,
infographics, whitepapers, webinars and online events from the world’s foremost
thought leaders.

We respect your privacy, by clicking 'Subscribe' you will receive our
e-newsletter, including information on Podcasts, Webinars, event discounts,
online learning opportunities and agree to our User Agreement. You have the
right to object. For further information on how we process and monitor your
personal data click here. You can unsubscribe at any time.


We use cookies and similar technologies to recognize your visits and
preferences, as well as to measure the effectiveness of campaigns and analyze
traffic.
To learn more about cookies, including how to disable them, view our Cookie
Policy Close
AddThis Sharing Sidebar
Share to FacebookFacebook
, Number of shares
Share to TwitterTwitterShare to LinkedInLinkedInShare to EmailEmailShare to
PrintPrintMore AddThis Share optionsAddThis
, Number of shares
Hide
Show
Close

AddThis

AddThis Sharing
SHARESFacebookTwitterLinkedInEmailPrintAddThis

Powered byPicreel