www.brighttalk.com
Open in
urlscan Pro
23.56.200.7
Public Scan
Submitted URL: https://go.pingidentity.com/dc/j-0ZLuKiroz5jBuK2yHK5CJ6ILCpYkKSM2bjwsh0ZROBLDOCRlVoWosxQeBMNbdj_JjHDkKRfdMaOcr5304Fkez-0m0Ua...
Effective URL: https://www.brighttalk.com/webcast/9491/618304?bt_tok=21663655&utm_source=email&utm_medium=Marketo&utm_campaign=WB-AMER-202...
Submission: On July 08 via api from US — Scanned from DE
Effective URL: https://www.brighttalk.com/webcast/9491/618304?bt_tok=21663655&utm_source=email&utm_medium=Marketo&utm_campaign=WB-AMER-202...
Submission: On July 08 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
IDENTITY THREAT PROTECTION: HARNESSING RISK SIGNALS FOR ENTERPRISE SECURITY Jul 09 2024, 6:00pm CEST Duration: 60 mins PRESENTED BY Advait Deodhar, VP, Sales Engineering and Max Fathauer, WF IAM Evangelist - Ping Identity ABOUT THIS TALK In today's digital landscape, cyber threats make identity protection more critical than ever, especially in managing employee access. With the rise of increasingly dangerous identity-related attack vectors such as account takeover (ATO), insider threats, and adversary-in-the-middle (AitM) attacks, safeguarding identity has become essential. As threats become more commonplace and breaches more costly, protecting employee, contractor, and partner identities is paramount to maintaining security and operational integrity. Join Ping Identity VP of Sales Engineering Advait Deodhar and Workforce IAM Evangelist Max Fathauer in this webinar to explore risk-based authentication and how incorporating risk signals into your security stack fortifies identity and prevents breaches. We'll dive into PingOne Protect, the Ping Identity Platform’s comprehensive risk engine, and how it analyzes threats, aggregates multiple risk predictors and creates a risk score to help you stop bad actors and mitigate risk. Discover how advanced features like machine learning risk algorithms, pre-configured risk policies, and out-of-the-box risk predictors can thwart emerging threats while alleviating your organization's MFA fatigue. Key Takeaways: - Understanding Risk Signals: Learn what risk signals are and how the Ping Identity Platform enables you to detect and respond to identity threats in real-time - Leveraging Risk-Based Authentication: Discover why risk-based authentication is crucial for reducing unauthorized access and breaches - Implementing Security Measures: Learn how PingOne Protect shields your organization against some of the most common and damaging threats, including third-party threats - Reducing MFA Fatigue: Explore how risk signals can be leveraged to provide a more seamless end-user experience while still facilitating secure user journeys Share Post Share Link Copied! Related topics: Ping Identity MORE FROM THIS CHANNEL Ping Identity Upcoming talks (8) On-demand talks (99) Subscribers (19692) Explore Cloud Identity Security with Ping Identity. Experience Single Sign-on for Cloud and Mobile Find out how our identity and access management platform gives enterprise customers and employees one-click access to any application from any device.…