www.brighttalk.com Open in urlscan Pro
23.56.200.7  Public Scan

Submitted URL: https://go.pingidentity.com/dc/j-0ZLuKiroz5jBuK2yHK5CJ6ILCpYkKSM2bjwsh0ZROBLDOCRlVoWosxQeBMNbdj_JjHDkKRfdMaOcr5304Fkez-0m0Ua...
Effective URL: https://www.brighttalk.com/webcast/9491/618304?bt_tok=21663655&utm_source=email&utm_medium=Marketo&utm_campaign=WB-AMER-202...
Submission: On July 08 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

IDENTITY THREAT PROTECTION: HARNESSING RISK SIGNALS FOR ENTERPRISE SECURITY


Jul 09 2024, 6:00pm CEST
Duration: 60 mins



PRESENTED BY

Advait Deodhar, VP, Sales Engineering and Max Fathauer, WF IAM Evangelist - Ping
Identity


ABOUT THIS TALK

In today's digital landscape, cyber threats make identity protection more
critical than ever, especially in managing employee access. With the rise of
increasingly dangerous identity-related attack vectors such as account takeover
(ATO), insider threats, and adversary-in-the-middle (AitM) attacks, safeguarding
identity has become essential. As threats become more commonplace and breaches
more costly, protecting employee, contractor, and partner identities is
paramount to maintaining security and operational integrity. Join Ping Identity
VP of Sales Engineering Advait Deodhar and Workforce IAM Evangelist Max Fathauer
in this webinar to explore risk-based authentication and how incorporating risk
signals into your security stack fortifies identity and prevents breaches. We'll
dive into PingOne Protect, the Ping Identity Platform’s comprehensive risk
engine, and how it analyzes threats, aggregates multiple risk predictors and
creates a risk score to help you stop bad actors and mitigate risk. Discover how
advanced features like machine learning risk algorithms, pre-configured risk
policies, and out-of-the-box risk predictors can thwart emerging threats while
alleviating your organization's MFA fatigue. Key Takeaways: - Understanding Risk
Signals: Learn what risk signals are and how the Ping Identity Platform enables
you to detect and respond to identity threats in real-time - Leveraging
Risk-Based Authentication: Discover why risk-based authentication is crucial for
reducing unauthorized access and breaches - Implementing Security Measures:
Learn how PingOne Protect shields your organization against some of the most
common and damaging threats, including third-party threats - Reducing MFA
Fatigue: Explore how risk signals can be leveraged to provide a more seamless
end-user experience while still facilitating secure user journeys

Share

Post

Share

Link
Copied!

Related topics:
Ping Identity


MORE FROM THIS CHANNEL


Ping Identity
Upcoming talks (8)
On-demand talks (99)
Subscribers (19692)
Explore Cloud Identity Security with Ping Identity. Experience Single Sign-on
for Cloud and
Mobile Find out how our identity and access management platform gives enterprise
customers and employees one-click access to any application from any device.…