Loading…
This event has ended. Visit the official site or create your own event on Sched.
ONLINE REGISTRATION IS NOW CLOSED. Please visit us on-site during registration hours next week to get a badge.

About the CONNECT Conference:                                                        

Today’s threat landscape is broad and sophisticated, and the consequences for failing to adequately protect against threats and respond appropriately when an attack is underway are far reaching. SecureAuth and Core Security deliver to enterprise-class organizations a discover, secure & protect, and respond capability that is only possible with vulnerability, endpoint, and network security fused with a strong identity protection framework.

Identity-based security automation is a new category that reflects the challenges of a silo’ed approach to enterprise security. Automation in the security operations center (SOC) is the inevitable result of increasingly sophisticated technologies and automation is only possible when false positive and negative results are minimal and the response action is precise and coordinated to minimize restrictions on legitimate access to enterprise resources.

SecureAuth and Core Security customers attending the CONNECT event will hear from company leaders, respected speakers, and industry peers on this new approach to the threat landscape. Product sessions will dive into details on current and future products, and research team members will be available to discuss new technologies. 

REGISTER TODAY

Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

Identity Breakout [clear filter]
Tuesday, October 17
 

12:30pm EDT

Identity Governance Roadmap
Speakers
avatar for Michael Marks

Michael Marks

Product Manager - Identity, Core Security
Michael Marks is the Product Manager for the Identity products at Core Security. Prior to joining Core, he was the Identity and Access Management Architect at Coca-Cola Enterprises and a consultant in the IT Security and GRC practice with one of the Big 4. He recently received his... Read More →


Tuesday October 17, 2017 12:30pm - 2:00pm EDT
Ellington Salon A

2:30pm EDT

Data Access Governance: Foundations, Roadmap and Case Studies
ABSTRACT:
Understanding every time someone exports data to Excel they create risk for that information, means you know the need for Data Access Governance (DAG). We will cover the challenge unstructured data poses, the foundations of securing, monitoring, and governing access to that data, and walk through how some other organizations have succeeded in controlling their risks. You will gain the insight to start asking the right questions about how your organization is approaching DAG today, and how it may need to change that approach to meet security and compliance goals in the future.

Speakers
avatar for Jonathan Sander

Jonathan Sander

CTO, STEALTHbits


Tuesday October 17, 2017 2:30pm - 3:15pm EDT
Ellington Salon B

3:15pm EDT

An Identity Evolution - IAM Eastman!

Eastman started its identity journey in 2013 when they looked to acquire an Identity Management (IDM) solution that ended with the purchase of Courion (Core Security).

The first objective was to replace an existing password synchronization product, roll out self-service password reset, and eliminate PII access from the Global Help Desk. 

Phase 2 was geared toward automation; onboarding and off-boarding of users.  In addition, Eastman set out to establish an authoritative source for third parties using SecZetta’s NE Profile solution. By implementing an authoritative source built for third parties, Eastman aimed to bring the same automation to third party, non-employees.

In this session, you will hear Eastman highlight the information collection processes, adoption techniques, result tracking, lessons learned, and future aspirations. 


Speakers
avatar for Justin Matthews

Justin Matthews

Security Analyst, Eastman Chemical
Justin Matthews has worked in the Security field at Eastman for the past 3 and half years.  He started off working on endpoint security, and quickly transitioned to identity and access management (IDM).  Justin transitioned to become the lead technical analyst on IDM in late 2015... Read More →


Tuesday October 17, 2017 3:15pm - 4:00pm EDT
Ellington Salon B
 
Wednesday, October 18
 

1:00pm EDT

Access Assurance Suite Tips & Tricks
Everyone loves a good tip, like using toothpaste to clear up hazy car headlights.  In this session, Identity users will learn from the master, our lead architect, Lisa Lombardo, as she goes through tips and tricks to make sure you’re getting the most out of your IAM deployment. Come with your questions about Core Access, Core Compliance and Core Password.

Speakers
avatar for Lisa Lombardo

Lisa Lombardo

Principal Architect Identity Products, Core Security
Hello. My name is Lisa Lombardo and I have been with Core Security (and earlier Courion) for 21 years with responsibilities in the product and support areas. I have lived, breathed, bled, sweated, cried, laughed, and existed in the Identity and Access Management world for a while... Read More →


Wednesday October 18, 2017 1:00pm - 1:45pm EDT
Ellington Salon D

1:45pm EDT

Core Connector API Demo
Did you know that we released a new way to integrate Core Access with your target systems without a custom connector? Did you know it’s free? Join us to learn about how to use the Core Connector API to tie into your web-services or API enabled target systems.

Speakers
avatar for Michael Marks

Michael Marks

Product Manager - Identity, Core Security
Michael Marks is the Product Manager for the Identity products at Core Security. Prior to joining Core, he was the Identity and Access Management Architect at Coca-Cola Enterprises and a consultant in the IT Security and GRC practice with one of the Big 4. He recently received his... Read More →


Wednesday October 18, 2017 1:45pm - 2:30pm EDT
Ellington Salon D

3:00pm EDT

Introducing Core Role Designer

Come meet the newest member of the Core Security product family – Core Role Designer. Our visual-first, analytics driven approach to designing roles will help you understand the relationship between people and what they have access to. You’ll not only be able to create the best roles possible, you’ll also discover rogue access and underprovisioned accounts in your organization. Step up your role game with Core Role Designer.


Speakers
avatar for Michael Marks

Michael Marks

Product Manager - Identity, Core Security
Michael Marks is the Product Manager for the Identity products at Core Security. Prior to joining Core, he was the Identity and Access Management Architect at Coca-Cola Enterprises and a consultant in the IT Security and GRC practice with one of the Big 4. He recently received his... Read More →


Wednesday October 18, 2017 3:00pm - 3:45pm EDT
Ellington Salon D

3:45pm EDT

Identity Governance Roadmap Feedback
Make your mark on the future of IAM! Join Michael Marks, Core Security’s Product Manager for Identity, and tell him what you want to see in the next releases of Core Security’s identity products.

Speakers
avatar for Michael Marks

Michael Marks

Product Manager - Identity, Core Security
Michael Marks is the Product Manager for the Identity products at Core Security. Prior to joining Core, he was the Identity and Access Management Architect at Coca-Cola Enterprises and a consultant in the IT Security and GRC practice with one of the Big 4. He recently received his... Read More →


Wednesday October 18, 2017 3:45pm - 4:15pm EDT
Ellington Salon D