Barbara Call

Episode 4: Adding Intelligence to Your CIAM Strategy
Sponsor Podcast Okta

Episode 4: Adding Intelligence to Your CIAM Strategy


Episode 3: You’ve Passed CIAM 101 – Now It’s Time to Automate

Episode 3: You’ve Passed CIAM 101 – Now It’s Time to Automate

Episode 3: You’ve learned the basics of customer identity and access management (CIAM). And you’ve listened as experts from Okta explained the CIAM Maturity Curve, which helps organizations determine where they fall on the...

Episode 2: You’re New to CIAM – Now What?

Episode 2: You’re New to CIAM – Now What?

Episode 2: So you’ve got a basic understanding of customer identity and access management (CIAM) and why it’s so important. Now it’s time to determine where you fall on Okta’s CIAM Maturity Curve and how to use that assessment to...

Episode 1: Introduction to CIAM and Why It’s Important

Episode 1: Introduction to CIAM and Why It’s Important

Episode 1: Why a strong CIAM approach is essential to keeping your customers happy

Episode 1: Introduction to CIAM and Why It’s Important

Episode 1: Introduction to CIAM and Why It’s Important

Episode 1: Why a strong CIAM approach is essential to keeping your customers happy

Multicloud and the Enterprise Network: The Next Chapter in Transformation

Multicloud is the new IT reality. But multicloud IT places unique strains on the enterprise network. Complexity increases, security is more complex, and data in transit changes. Connecting legacy systems and on-premises data centers...

Evolving Your Network – The Financial & Operational Realities

In today’s typical enterprise networking model, 80% of annual spend is associated with IT infrastructure operations. At the same time, IT budgets are being squeezed, and many CIOs find themselves unable to fund new differentiated...

Self-funding Your Network Transformation

This podcast has explored why enterprises need to upgrade their legacy networks (Episode 1) and the financial and operational challenges they face in doing so (Episode 2). Today’s episode will address Cisco’s solution for self-funding...

Protect Your Business from Cyber Threats

Protect Your Business from Cyber Threats

Today's security professionals face many challenges in trying to secure the enterprise. Join us as we discuss how CIOs and CSOs can get their hands around the varying issues. Special guest Limor Kessem, Executive Security Advisor,...

Balancing Enterprise Security and User Access: 6 Points to Keep in Mind

Balancing Enterprise Security and User Access: 6 Points to Keep in Mind

Adopt the right mindset, update your methodologies, and don’t forget the human factor.

AI and Machine Learning – The Potential to Challenge and Transform

AI and Machine Learning – The Potential to Challenge and Transform

Best bets for future impact: Security, data-driven decision making, and product development.

How Can You Really Turn Technology into Innovation?

How Can You Really Turn Technology into Innovation?

Every company is struggling to innovate – at breakneck speed. The SAP Leonardo platform offers an integrated approach to capitalize on technology such as IoT, cloud, and big data today. Digital transformation is upon us, and...

Load More