Optiv Security Ramps Up for Cloud Identity Summit

Optiv Security Ramps Up for Cloud Identity Summit

-- Optiv to Share Significant Expertise to Help Organizations More Successfully Address Identity at the Project, Problem and Strategy Levels --

 

Denver – June 6, 2016 - Optiv Security, a market-leading provider of end-to-end cyber security solutions, today announced that its security experts will participate in eight different sessions at the 2016 Cloud Identity Summit (CIS). The speakers will share insights based on their expertise in helping organizations plan, build and run successful cloud and identity-focused security programs. The summit is scheduled to take place June 6-9, 2016 at the New Orleans Marriott in Louisiana.

 

Sessions include:

Identity Really is the New Perimeter

Who/Topic: With the proliferation of advanced threats, juxtaposed against increased connectivity demands of employees, vendors, business partners and consumers; identity is being looked at more than ever as a layer of defense, and in many ways, as the new perimeter. In this session, Aubrey Turner, client solutions director, will discuss how various types of technology are adapting to embrace this paradigm, and high-level approaches to prepare and react to this evolving security model.

When/Where: Monday, June 6 from 4:15 – 4:40 p.m. CST/Salon E

 

Identity. It's Not Just a Thing, It's Integrated into Everything

Who/Topic: Many organizations have made investments in identity and access management (IAM) to support functions like user lifecycle management, identity governance or single sign-on. The identity industry is evolving, and identity is becoming the critical core of any security strategy. Attendees of this session led by Robert Block, vice president, strategic solutions, will learn how expanding the role of identity in their environment can revolutionize their approach to cyber security.

When/Where: Tuesday, June 7 from 9:30 – 9:55 a.m. CST/Salon E

 

CISO & Identity = (Oil & Water) or (Oil & Vinegar) and What that Means to Your Organization

Who/Topic: Too many CISOs do not embrace identity and its importance to a successful cyber security program, making the CISO and identity seem like oil and vinegar. During this session, Larry Whiteside Jr., vice president, executive strategy, healthcare and critical infrastructure solutions, will explain how oil and vinegar are not just great on salads, but also vital for the success of a CISO’s cyber security strategy.

When/Where: Tuesday, June 7 from 10:40 – 11:05 a.m. CST/Salon E

 

“Optivized” Cloud Security – Establishing the Pillars for a Successful CloudSec Program

Who/Topic: The adoption of cloud computing is a clear reaction to enterprises’ need for agility, elasticity and cost-effective IT solutions. In mature organizations, security professionals are in a rare position to address security early on in adoption cycles or even propose more secure alternatives that enable the adoption of innovative IT delivery. JD Sherry, vice president, strategy and innovation, will inform attendees about the common pillars one should include in their cloud security strategy.

When/Where: Tuesday, June 7 from 2:30 – 2:55 p.m. CST/Salon E

 

Panel: Federated Identity for Large Scale Deployments

Who/Topic: With the rise of cloud-based business and customer portals, enterprises need to be prepared to serve an exploding number of constituents, while also providing single sign-on and seamless UX for all users. In this session, Joe Greene, director, information security, and a panel of experts will lay out some key advantages of identity virtualization through the lens of federation and discuss the enhanced infrastructure speed, flexibility and security their respective IAM teams were able to achieve.

When/Where: Wednesday, June 8 from 10:55 – 11:20 a.m. CST/Studio 1/2

 

Keynote Panel: Identity Defined Security – Enabling the R/evolution

Who/Topic: The traditional IT security approach of putting trusted users, devices and applications behind a single perimeter is no longer sufficient. In our increasingly decentralized, deperimeterized, 'bring-your-own-anything' world, we need a better approach to protect users, customers, data and assets. In this panel featuring Robert Block, leaders from the Identity Defined Security Alliance will discuss this new approach to security and how it can help deliver a better and safer experience.

When/Where: Wednesday, June 8 from 5:30 – 6:00 p.m. CST/Grand Ballroom

 

Secure DevOps – Shared Responsibility

Who/Topic: Infrastructure as a Service (IaaS) assets are completely under your control and require you to perform all of the necessary security configuration and management tasks. Today’s IT and security organizations see the world of IaaS through a variety of lenses depending on the charter the business has given them to transform how they deliver IT services. In this session, JD Sherry will walk attendees through some of the thoughtful considerations about how to secure these services and not slow down the speed of adoption of cloud infrastructure.

When/Where: Thursday, June 9 from 9:30 – 9:55 a.m. CST/Salon E

 

Cloud Security Program, Best in Breed?

Who/Topic: More and more organizations are in the process of planning, building or running a cloud security program. Whether identifying, encrypting, protecting or securing data in today's enterprises, Tim Benner, senior client solutions architect, will help session attendees craft an effective plan using the best-in-breed technology.

When/Where: Thursday, June 9 from 10:40 – 11:05 a.m. CST/Salon E

 

Optiv recently expanded its leadership position in IAM with its acquisition of IAM solutions and services provider Advancive. The transaction helped Optiv create the industry’s deepest and broadest bench of IAM experts with experience in and capabilities across an extensive technology portfolio. The move also gave Optiv additional expertise to develop new and innovative IAM services and solutions to better help clients plan, build and run holistic IAM security programs that meet their specific business needs. 

 

Optiv is proud to be a founding security sponsor of the CIS and will exhibit at booth number one. Media wishing to interview Optiv’s experts should contact Jennifer Torode at jtorode@chenpr.com or (781) 672-3119.

Optiv Security: Secure greatness.®

Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential. For more information, visit www.optiv.com.

Would you like to speak to an advisor?

How can we help you today?

Image
field-guide-cloud-list-image@2x.jpg
Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation
Image
OptivCon
Register for an Upcoming OptivCon

Ready to speak to an Optiv expert to discuss your security needs?