
Apply Zero Trust IAM Principles To Secure Software Bots, Physical Robots, And IoT Devices
Get access to a single webinar that is currently outside of your subscription.
Price: $300 (USD)
Partner with Forrester Research to get access to webinars, insights and frameworks aligned to your role. Shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer.
Do you know how many software bots, physical robots, or internet of things (IoT) devices are connected to your network? How many of these devices store or interact with critical data? Such non-humans boost productivity but also amplify operational challenges related to discovery, lifecycle management, and compliance. They can also expand your threat surface, leading to unmanaged zombie accounts that malicious actors will use to carry out attacks. Is your identity and access management (IAM) program ready?
Key takeaways:
Target audience level: intermediate and advanced
You'll receive an email with dialing and Webex instructions prior to the Webinar.
See the Webinar FAQs for answers to technical and other Webinar questions.
This webinar was originally scheduled for April 21, 2023Join us for a discussion about the state of cyber insurance in 2023, covering trends, market dynamics, and the impact to cybersecurity programs and risk management strategy.Key takeaways:Gain an understanding of the current state of cyber insurance adoption and common misconceptions about coverage.Learn how evolving cyber insurance trends and requirements will impact your policy renewal.Identify how cyber insurance will impact your cybersecurity program and incident response considerations and what benefits you can expect from the cyber insurance ecosystem.Target audience level: intermediate
Enterprises use AI decisioning platforms to create human-governed, AI-powered, automated decision engines for a wide variety of use cases and across numerous industries. The platform capabilities include collaborative authoring tools to enable business and technical team members to develop decision logic, deployment engines to execute decisions in real-time and at scale, and business decision monitoring tools to measure and improve the efficacy of deployed decisions. Key takeaways:Automate complex, consequential business decisions.Make AI decisioning teams more agile.Combine the latest AI decisioning technologies.Target audience level: all levels
Customer-obsessed organizations have a future fit technology strategy that enables adaptivity, creativity, and resilience — and cybersecurity is a critical part of that strategy. It’s impossible to have a great technology organization without a great security organization, and future fit tech firms demonstrate this by scoring higher on Forrester’s cybersecurity and privacy maturity assessment than their less-tech-mature peers.Join us as we talk about the relationship between future fit tech organizations and their security teams. In this moderated discussion, we’ll cover security maturity, the evolution of security priorities, and characteristics of future fit CISOs.Key takeaways:Explore the relationship between future fit tech maturity and cybersecurity maturity.Learn about security priorities that are particularly important to traditional tech, modern tech, and future fit firms.Understand how the customer-facing CISO aligns with future fit tech maturity.Target audience level: beginner