RSA Webinars

Filter selections by:

Join Dicker DataWISE Law Cyber Consulting and SecurID on September 8 at 11 AM to discuss #cybersecurity best practices, #ZeroTrust, consumer and privacy law, and much more.

Securing and protecting identities grows increasingly challenging in today’s environment of complex, interconnected systems and ever-tightening regulations. In this webinar, SecurID Field CTO Chris Williams, and Corporate Pen-tester and Expert Security Researcher Hector Monsegur with Alacrinet will discuss how to get control of who has access to what, and why—with a ubiquitous, secure-by-design and private-by-design approach that provides the strong IGA capabilities that are fundamental to fully understanding your identity and access environment.

14 Jul 2021
60 min
On-Demand Webinar

Join this webinar to learn how SecurID can help you make the move away from passwords-for-everything and toward a more secure, passwordless future.

You’ll hear about:

  • Passwordless methods like FIDO-based authentication that are growing in popularity
  • SecurID passwordless capabilities for web/SaaS and Windows environments
  • Environments ranging from Windows to the web and SaaS-based environments as well as Windows logins
23 Jun 2021
87 min
On-Demand Webinar

The Trusted Identity Platform - all the capabilities you need in a single solution.

SecurID has everything you need to address today’s unprecedented challenges in authentication, access management and identity governance—without compromising security, ease or convenience.

22 Jun 2021
79 min
On-Demand Webinar

Trusted Identity Platform: todas las capacidades que necesita en una única solución.

SecurID tiene todo lo que necesita para abordar los desafíos sin precedentes de la actualidad en materia de autenticación, administración de acceso y control de identidad, sin comprometer la seguridad, la facilidad o la conveniencia.

22 Jun 2021
85 min
On-Demand Webinar

Trusted Identity Platform - todos os recursos de que você precisa em uma única solução

O SecurID tem tudo que você precisa para enfrentar os desafios sem precedentes de autenticação, gerenciamento de acesso e governança de identidade - sem comprometer a segurança, facilidade ou conveniência.

27 Apr 2021
45 min
On-Demand Webinar

In this webinar, cybersecurity experts Sam Curry CSO at Cybereason and Hector Monsegur Corporate Pen-tester and Expert Security Reseacher with rThreat examine the continuum that runs from Zero Trust to complete trust, and the changing implication tradeoffs in risk and business terms throughout. For practical reasons, the Zero Trust ideal of “never trust, always verify” has evolved into something more nuanced, dynamic – and achievable. You’ll learn how incremental steps toward Zero Trust can pave a more realistic path, one that for now moves us to the least trust needed to align what the business needs and what keeps it secure. Perfection is the enemy of the good.

15 Apr 2021
45 min
On-Demand Webinar

In this virtual webinar, security experts Sam Curry, CSO of Cybereason and Jim Ducharme, COO of the RSA Anti-Fraud Business examine Identity as the control plane for security. Today, data resides across a complex range of vendors and platforms. You’ll learn how Identity empowers users with convenient access across these environments – and evaluates risk and business context to assure that users are who they say they are.

04 Dec 2020
30 min
On-Demand Webinar
28 Oct 2020
45 min
On-Demand Webinar

The internet of things (IoT) has presented numerous real or perceived security challenges, but edge computing promises a way to respond and overcome them, in part by giving security analysts and admins the ability to monitor, detect and handle IoT threats. RSA partner IOTech Systems joins us to show how IoT edge computing can help you get IoT under control and secured.

20 Aug 2020
60 min
On-Demand Webinar

What do leading-edge companies include in their business cases for public cloud services? Are they hosting high-risk, mission critical applications in the cloud? How are they structuring cloud security teams for success?

Get answers to these and many other questions when RSA and 451 Research discuss the state of cloud transformation and cloud security: 

  • Understand how cloud transformation is affecting stakeholders across IT, security and the lines of business.
  • Find out how security and cloud engineering teams can work together most effectively.
  • Discover how leading-edge companies are overcoming a lack of cloud security skills.
  • See what controls organizations are putting in place to mitigate cloud security risks.

The current business environment may have accelerated your digital transformation initiatives or altered your approach to remote workers. With these changes come additional challenges and risks. In this webinar, you’ll learn how to address both from an identity and access management perspective, and how new capabilities in RSA SecurID Access (including RSA Authentication Manager 8.5) can help you succeed in today’s environment.

Specifically, the presentation will cover:

  • How to broaden protection while ensuring user productivity for all users and applications, with a focus on Microsoft Windows, macOS, and FIDO authentication
  • How to move to the cloud more efficiently, even if you have legacy applications and infrastructure
  • How a hybrid approach can simplify upgrades and help you get more value out of your investment

The current business environment may have accelerated your digital transformation initiatives or altered your approach to remote workers. With these changes come additional challenges and risks. In this webinar, you’ll learn how to address both from an identity and access management perspective, and how new capabilities in RSA SecurID Access (including RSA Authentication Manager 8.5) can help you succeed in today’s environment.

Specifically, the presentation will cover:

  • How to broaden protection while ensuring user productivity for all users and applications, with a focus on Microsoft Windows, macOS, and FIDO authentication
  • How to move to the cloud more efficiently, even if you have legacy applications and infrastructure
  • How a hybrid approach can simplify upgrades and help you get more value out of your investment

The current business environment may have accelerated your digital transformation initiatives or altered your approach to remote workers. With these changes come additional challenges and risks. In this webinar, you’ll learn how to address both from an identity and access management perspective, and how new capabilities in RSA SecurID Access (including RSA Authentication Manager 8.5) can help you succeed in today’s environment.

Specifically, the presentation will cover:

  • How to broaden protection while ensuring user productivity for all users and applications, with a focus on Microsoft Windows, macOS, and FIDO authentication
  • How to move to the cloud more efficiently, even if you have legacy applications and infrastructure
  • How a hybrid approach can simplify upgrades and help you get more value out of your investment
06 May 2020
60 min
On-Demand Webinar

As identity-based attacks continue to grow, some organizations have started to consider a future without passwords to support the diverse requirements of a global, dynamic workforce. In this webinar, you will hear how VMware, a global leader in cloud infrastructure and digital workspace technology, has started on a journey to go passwordless, their lessons learned and benefits achieved. Read the blog.

RSA and our partners have seen unprecedented interest in organizations looking to quickly and securely set up their workforce with remote secure access. Now that the initial demand has (relatively) subsided, many of these organizations are looking at other risks and business resiliency challenges, including resuming critical business or IT functions, staying compliant with changing regulatory mandates, and managing third parties and supply chain issues.

Join Patrick Potter, Digital Risk Strategist at RSA, as he discusses how RSA Archer solutions can help your customers:

  • Build business resiliency in times of crisis.
  • Manage today’s third-party risks.
  • Navigate regulatory changes and compliance.

Can’t make the webinar? Sign up anyway and we’ll send you a recording as soon as it’s available.

Exploring MFA Options, Identity and Access Assurance

RSA and our partners have seen an unprecedent surge of organizations looking to quickly and securely set up their workforce with remote access. Now that the initial surge for VPN access has (relatively) subsided, many of these organizations are facing the challenges that come with conducting business remotely, including access management, identity assurance and managing third party vendors.

We welcome partners to join us for the first of a webinar series on how to help your partners identify and mitigate any digital risk that come with managing a dynamic workforce.

Join members of our RSA SecurID Suite product team, Murtaza Hafizji, Gerald Aubel and Jacqui Berg, as they review additional options for your customers.

  • How to extend MFA capabilities and best use cases, including Virtual Desktops/VDI, Firewall, Privileged Access Management, Cloud Apps, Servers, etc.
  • Exploring access governance: who has access to what and how is access being managed?
  • Discovery questions to help you assess your customers digital risk. 

Can’t make the webinar? Sign up anyway and we’ll send you a recording as soon as it’s available.

Today’s unprecedented business disruptions cast a glaring spotlight on critical risks that can impede the resilience of any organization. The more complex your business and the larger your third-party ecosystem, the harder it is to maintain your operations in the face of disruption.

Join Patrick Potter, Risk Strategist at RSA, for the second webinar in our two-part series on the critical steps organizations can take to help minimize business disruption.

02 Apr 2020
60 min
On-Demand Webinar

Welcome to Digiville, the idyllic town where security and risk leaders come together to manage digital risk and enable digital transformation.  In this webinar series, we will navigate the critical areas of risk that come with digital transformation.  First up, the weather forecast: cloudy with a chance of risk.

Organizations are expected to spend $6 trillion in the next four years on digital transformation initiatives, according to IDC.  And at the heart of nearly every digital transformation is the adoption of cloud technology.  In this first webinar, we will explore the risks associated with cloud transformation and offer practical tips to organizations on how to overcome the challenges of access controls, visibility and governance within cloud environments.

31 Mar 2020
60 min
On-Demand Webinar

Many organizations today are trying to maintain business operations amid unprecedented disruption by either expanding their remote workforces or implementing work from home policies for the first time. The scale of these efforts combined with the dynamic workforce risks they create require special preparation and careful planning. 

18 Mar 2020
60 min
On-Demand Webinar

Business disruptions abound these days, affecting governments, countries, organizations, communities and individuals. From cyberattacks to natural disasters to outbreaks of illness, these disruptions spotlight critical risks we should all think about. Join this webinar to hear from RSA experts on managing business resiliency risk, risks of using third parties, and dynamic workforce risks and how to provide continuity in uncertain times.

It’s clear that digital initiatives are forcing both evolutionary and revolutionary changes in managing risk and security around the world. According to the RSA® Digital Risk Report, while cloud computing is the common thread running through these changes, to understand and manage digital risk means understanding the human element. 

In this webinar, you’ll hear from industry experts on the highlights and insights uncovered, including: 

  • Cloud’s role in driving the shifts in digital risk 
  • The ripple effects of digital and workforce transformation on risk and security 
  • Top digital risk management priorities by region 
  • The mandate to work together across departments and the line of business’ role in managing digital risk

This webinar will explore communication challenges around information security, the typical journey organizations are taking to bring information risk management into the broader umbrella of business risk management, and the advantages accruing to organizations as they mature their information risk management programs.

09 May 2019
60 min
On-Demand Webinar

In this webinar, RSA’s Steve Schlarman and The Security Ledger’s Paul Roberts explore the critical role risk management plays in the success of digital transformation initiatives. They share case studies of companies that are managing digital risk effectively and offer an approach for managing these risks. This webinar outpaced the first one in the series as our most popular webcast ever.

13 Mar 2019
60 min
On-Demand Webinar

Building on the popularity of the highly technical Operationalizing Incident Response workshop, RSA is offering a special virtual version of this in-person event. During the webinar, Shane Harsh will describe a business-driven security framework for the fundamentals of operational threat hunting and incident response. This will enable your organization to understand the essential elements required to build an effective, repeatable, and cross-functional IR plan.

Agencies are currently facing multiple security, identity and governance programs. For the most part, they tend to act as individual disciplines with siloed agendas, schedules, obligations, users and budgets. Most of these programs take severely different approaches to common challenges, such as inclusion, classifications for different types of users and specific technical details about target coverage models. Attend this webinar to learn how to architect a path forward and receive one (ISC)2 CPE credit.

23 Oct 2018
60 min
On-Demand Webinar

Explore how Dell EMC's Data Protection Suite and RSA's NetWitness can successfully secure your infrastructure, increase your platform efficiency, and simplify management processes. Both Dell EMC and RSA ransomware solutions can be found on Carahsoft's Continuous Diagnostics and Mitigation (CDM) Tools Special Item Number (SIN) 132-44 on our GSA IT Schedule 70. Join us on October 23rd to learn how these solutions can protect your workspace with threat detention and data protection

23 Oct 2018
60 min
On-Demand Webinar

Do you find yourself thinking “I don’t have time for all of these alerts? It just takes me too much time to collect the data per incident?” Or  “Why are my tier 3 analysts dealing with so many manual tasks instead of hunting?” Join RSA to learn about how Security Automation and Orchestration can help reduce alert fatigue, make your SOC team more efficient, and better leverage existing security investments than “just” adding new tools.

13 Sep 2018
60 min
On-Demand Webinar

Would you ride in an autonomous vehicle if you knew it did not know where other cars were located while in motion?  This is akin to asking your users to share data on the network with no idea who, what or when that data is being shared and how secure it is. Join this webinar to explore how to give security analysts the visibility they need in order to properly understand the risks and potential threats to the network, ultimately protecting information and the business itself.

RSA conducted a study on the convergence of IT Security and Business Risk teams, to see if and how these teams collaborate to help reduce risk and strengthen threat detection and response. This webinar reviews key findings from a survey of 175 IT Security and 131 business risk (e.g. GRC, governance, risk, compliance, auditing, legal, IRM, integrated risk management) professionals. The findings highlight the challenges organizations face and the actions they’ve taken to improve collaboration—between people and also across goals, processes, tools and metrics—between their IT Security and Business Risk teams.

14 Jun 2018
60 min
On-Demand Webinar

How do you begin your journey to an Intelligent SOC? Start by evaluating where your dimensions of visibility, analytics, automation, and risk fall. With that knowledge you can build your roadmap in a sequence that delivers maximum impact and cost effectiveness. Join RSA experts to get tips on building your roadmap.

Gábor Varjas, the CISO of MOL Group, an international oil and gas company based in Hungary, speaks about his team’s journey to an intelligent security operations center (SOC) with members of the RSA Advanced Cyber Defense (ACD) Practice. Whether you have a full-blown SOC in place or a small security team, Varjas and the RSA ACD team share insights, best practices and “lessons learned” intended to help any security team improve its detection and response capabilities.

Most security operations centers rely on a security information and event management (SIEM) system to understand what’s happening in their environment and detect malicious activity. However, traditional SIEMs were built for compliance and log management purposes, so they don’t give SOC analysts the full visibility or sophisticated capabilities they need to detect and respond to today’s advanced and targeted threats. Get tips for evaluating SIEM solutions.

In today’s perimeter-free world, deploying multiple, prevention-focused point products or focusing only on complying with regulatory guidelines is not sufficient to prove the comprehensive protection required by the government enterprise. Learn more about the five key function areas which define the Cybersecurity Framework (CSF): identify, protect, detect, respond, and recover.

20 Feb 2018
60 min
On-Demand Webinar

The RSA Global Incident Response team will share a real-world, technical case study demonstrating how it used RSA NetWitness® Platform to contain and remediate a sophisticated attack perpetrated by the threat actor group Carbanak (also known as FIN7). You’ll come away with proven methods for threat hunting and incident response, as well as an in-depth understanding of how Carbanak intrusions tend to take place, so that you know what to look for in your own environment.

Each organization’s journey to the cloud is unique, but those journeys are more frequently being driven by business rather than technology needs. Consequently, security teams are put in an awkwardly reactive posture. The momentum driving organization’s deeper into the cloud, coupled with the need to secure a hybrid cloud and on-prem environment, present distinct challenges and threats.

ch-business-risk-management|Business Risk Management ch-fraud-prevention|Fraud Prevention ch-identity-access-insights|Identity & Access Insights ch-risk-security-strategies|Risk & Security Strategies ch-threat-detection-response|Threat Detection & Response
in-3d-secure-authentication|3D Secure Authentication in-adaptive-authentication|Adaptive Authentication in-cloud-mobile|Cloud & Mobile in-identity-assurance|Identity Assurance in-identity-governance|Identity Governance in-incident-response|Incident Response in-multi-factor-authentication|Multi-Factor Authentication in-rsa-archer|RSA Archer in-rsa-fraud-risk-intelligence|RSA Fraud & Risk Intelligence in-rsa-netwitness|RSA NetWitness in-rsa-securid|RSA SecurID in-secure-access|Secure Access in-siem|SIEM
to-business-driven-security|Business-Driven Security to-cloud-security|Cloud Security to-digital-risk|Digital Risk to-phishing|Phishing
ty-on-demand-webinar|On-Demand Webinar ty-upcoming-webinar|Upcoming Webinar