Watch our Hands-on Security Walkthrough Session on how to harden your Okta platform. Watch Now

On-Demand Webinar

On-Demand Webinar

 

Authomise and Templar Shield IDTR Roundtable

Organizations rely on their identity infrastructure to manage access and protect their assets. The lack of security monitoring for the IAM layer exposes organizations to identity-based attack such as account takeover, insider threats, and privilege escalation.

Identity Threat Detection and Response (ITDR) is the new framework coined by Gartner to protect organizations from identity-based risks and threats.

Join a roundtable with Sam Bradley, Sr. Director Governance, Risk & Compliance, Steven Riley, Authomize Head of Technical Enablement, Ravi Neriyanuri  and Frank Wray, Templar Shield Identity & Access Management leads on Tuesday, March 14, at 12pm EST. During the roundtable we will review what is ITDR, why it is critical to protect your IAM layer from identity-based attacks, and how to implement the core pillars of the ITDR Framework in four steps. Sign up today to learn how to:

  1. Eliminate risky access and misconfigurations across IaaS, SaaS, and IAM
  2. Mitigate active threats such as account takeover and user impersonation
  3. Leverage comprehensive visibility and control across your identity infrastructure

Can’t attend? Register and we’ll send you the recording.

Frank Wray

Director of the IAM practice

Frank is Director of the IAM practice at Templar Shield.  He has 20+ years of progressive experience advising, implementing, and leading IAM programs for fortune 500 companies. Frank’s team, under his leadership, received the 2019 SailPoint Innovation Award.  Frank’s experience in multiple Identity Governance solutions across many verticals makes him an excellent advisor and thought leader.  Frank experience as a professional in the Identity space covers areas in Integrations Delivery Management, Presales, and Enterprise Architecture.

Steven Riley

Director, Head of Technical Enablement

Steven Riley serves as Director of Technical Partner Enablement within Business Development team at Authomize. In this role, he works to maximize opportunities for selling security solutions within the ITDR space and services for Authomize and helps enterprise customers manage risk and compliance requirements. With over 15 years experience, Steven is a veteran of the enterprise security industry, he joins Authomize from Palo Alto Networks, Micro Focus, Hewlett Packard Enterprise and Symantec where he served as a partner lead engineer performing integrations for VM-Series virtualized NGFW and Prisma Cloud with the business development teams. While at Micro Focus and Hewlett Packard Enterprise, he held various positions responsible for security solutions, product management and technical marketing over ArcSight.

Ravi Neriyanuri

Managing Director and Heads IAM practice

Ravi Neriyanuri is a Managing Director and Heads IAM practice at Templar Shield. He has 26+ years of progressive experience advising global majors/fortune 500 companies on IAM strategy, program development, and technology implementation. Ravi led multiple products development in Enterprise Security and Information Risk Management areas, is an advisor, thought leader and has decades of experience in Delivery Management, Presales, Enterprise Architecture, Product Management, Risk Management, Competency building, Practice Building, and Incubation.

Sam

Sam Bradley

Sr. Director, Governance, Risk & Compliance

Sam is the Sr. Director, Governance, Risk & Compliance, at a technology company in the PNW. With over 16 years of experience ranging from “Big 4” to boutique consulting firms, to industry positions at companies like SAP Concur and Smartsheet, Sam offers extensive experience helping companies bring trust and assurance to the marketplace, advancing the security of operations, products, data, infrastructure, and people, and protecting brand and reputation. As a GRC leader, Sam has built teams and programs ranging from Enterprise Risk Management, Third Party Risk Management, Business Continuity and Disaster Recovery, Compliance Management, Policy Governance, Security Awareness & Training, and last but not least, Identity Governance & Administration. For more details, please reach out to [email protected]

Watch On-Demand

Take a deep dive