Reducing Third-Party Identity Risk During the Great Resignation and Beyond

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

A recent study from Microsoft recently that 41% of the global workforce are considering leaving their job in the next year. It's for this reason that 73% of CEOs cite labor and skills shortages as their top concern in 2022. To fill the talent gap, businesses are increasingly turning to third-party workers – and these users often need the same access to systems and data as regular employees. Whether the third parties are human, such as contractors, supply-chain providers and seasonal workers, or non-human, like IoT devices and bots, these identities pose a tremendous risk to cybersecurity and regulatory compliance.

In this webinar, a panel of experts will highlight the heightened insider threat risk facing organizations, and discuss possible solutions to enable a secure and compliant administration of joiners, movers and leavers who don’t work for you.

Join the session to learn:

  • How the Great Resignation is exacerbating insider threats and compliance risks to organizations
  • Security tools and processes that can reduce the threat posed by joiners, mover and leavers who don’t work for you
  • How to maintain your risk awareness while improving your compliance and audit posture going forwards

Speakers

Photo of James Coker

James Coker

Deputy Editor, Infosecurity Magazine

Photo of Dr Jason Nurse

Dr Jason Nurse

Reader in Cybersecurity, University of Kent

Photo of Chris Owen

Chris Owen

Director of Product Management, Saviynt

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Saviynt here: https://saviynt.com/privacy-policy/. Please see Infosecurity Magazine’s privacy policy for more information.