zero trust

Features of the seminar
Comprehensive explanation from the basics of ID security to future attention-grabbing solutions: ITDR/CIEM!
Recently, there has been an increase in the number of cases of "ID" compromise due to cyber attacks, and the importance of "ID security" is increasing.
However, we hear from many customers that when they start considering ID security, they are confused about where to start and how to proceed due to the variety of solutions available.
In this seminar, we will explain what ID security is and why it is needed now, including the differences from conventional security measures. We will also explain the ideal implementation steps for ID security solutions such as IAM, IGA, and PAM.
As the latest information that will be useful for customers who have already started considering ID security, we will also look at the "future" of ID security that will be required in the future, and introduce ITDR and CIEM, which are attracting attention as ID security for cloud services.
If you are collecting information or considering ID security, please join us.
Schedule/Application
schedule |
time |
venue |
Application |
- |
- |
- |
- |
How to participate in the online seminar
- Please register the necessary information from "Apply here" at the top of this page.
- We will email you the login URL for the online seminar by 17:00 the day before the event. *
- On the day of the event, when it is time, please access from the login URL and listen to the lecture.
※セキュリティポリシーなどの関係で届かない可能性がございます。届いていない場合は、zerotrust@macnica.co.jpまでご連絡ください。
*Registration is required to attend. Please refrain from sharing your login URL.
Event requirements
Venue |
Held as an online seminar *You can perform a connection test in advance from the following URL. https://zoom.us/test |
---|---|
Capacity | none |
Preparation |
What to prepare on the day
|
subject |
|
Cost | Free (pre-registration required) |
Program
13:00~13:15 |
Unraveling from “past and present”! The importance of identity security
|
---|---|
13:15~13:30 |
What are the ideal ID security implementation steps?
|
13:30~13:40 |
About the “future” of ID security
|
13:40~13:50 |
Q&A
|
*The program is subject to change without notice. Please note. Please check this web page for the latest information.
Inquiry/Document request
In charge of Macnica Zero Trust Co., Ltd.
- TEL:045-476-2010
- E-mail:zerotrust@macnica.co.jp
Weekdays: 9:00-17:00