Okta

Octa

Protect your data and ID more securely!

Features of the seminar

What are the benefits of Okta x Box collaboration? We will explain with demos and use cases.

Among cyberattacks, attacks that target employee IDs in particular are an important problem for companies, and if adequate countermeasures are not taken, they can lead to large losses.

Part One:

In addition to measures against ransomware, which is an external factor, vigilance against internal improprieties, which is an internal factor, is an important issue that each company must address when it comes to information leakage countermeasures. We will also introduce Box Shield's AI-based detection and log report-based detection methods tailored to your company.

Second part:

Okta, an IDaaS product, can detect advanced phishing attacks like AiTM using its unique authentication method "Okta Fastpass" and create reports on MFA fatigue attacks using the ID management task automation tool "Okta Workflows". You can take countermeasures. We will introduce these measures while showing actual operation demonstrations.

Schedule/Application

schedule

time

venue

Application

Scheduling

How to participate in the online seminar

  • Please register the necessary information from "Apply here" at the top of this page.
  • We will email you the login URL for the online seminar by 17:00 the day before the event. *
  • On the day of the event, when it is time, please access from the login URL and listen to the lecture.

※セキュリティポリシーなどの関係で届かない可能性がございます。届いていない場合は、okta-sales@macnica.co.jpまでご連絡ください。

*Registration is required to attend. Please refrain from sharing your login URL.

Event requirements

Venue

Held as an online seminar

*You can perform a connection test in advance from the following URL.

https://zoom.us/test
Capacity none
subject
  • DX promotion department/team, information system department
  • Data management, server management team, security, authentication management team
Preparation
What to prepare on the day
  • PC to attend the online seminar
  • Environment for Internet connection
Cost Free (pre-registration required)

Program

13:00~13:05
Opening greeting
13:05~13:30
Considering the assumption that IT information leak damage will occur, is your company fully prepared? ~Box~
  • Concept including measures against internal improprieties
  • How to minimize information leakage damage of IT assets
13:30~13:55
Strengthening authentication security with Okta
  • MFA fatigue attack reporting use case (Okta Workflows)
  • AiTM Phishing Attack Detection/Notification Use Case (Okta Fastpass)
13:55~14:00
Closing greetings and request for survey

*The program is subject to change without notice. Please note. Please check this web page for the latest information.

Inquiry/Document request

In charge of Macnica Okta Co., Ltd.

Mon-Fri 8:45-17:30