Navigating the Future of Identity: 2024 Year-End Review & Top Predictions for 2025
Join OCG for our year-end webinar as we examine 2024’s most impactful advances in Identity Management, Governance, and Security. We’ll also help you prepare for what’s next with predictions for 2025. Read more…
Discover the Microsoft Entra Suite
Learn how to leverage the Microsoft Entra Suite to streamline identity and access management processes, enhance security, and ensure compliance with industry regulations. Read more…
Securing Academic Partnerships: Overcoming Identity Challenges in Collaborative Higher Education Environments
In this webinar, we’ll look at how to improve your identity systems to better protect your users and data while making sure collaboration remains secure and effortless. Read more…
Exploring Microsoft’s Security Service Edge (SSE) Solution
Join us for an in-depth look at Microsoft’s newly launched Security Service Edge (SSE), including key components such as Microsoft Entra Private Access and Internet Access and how they replace legacy VPNs with Zero Trust Network Access (ZTNA) and secure web gateways for seamless, secure access to resources. Read more…
Transitioning from MIM to Microsoft Entra for Cloud-First IAM
OCG CTO James Cowling presents five different options for transitioning from on-premises MIM to a Microsoft-Entra focused solution. Read more…
The Rise of AI Threats: Identity Management
Join guest speaker John Howie to learn about the rising threat of AI to identity management systems, and what steps you can take today to protect your organization. Read more…
Understanding Privileged Access Management (PAM)
Privileged Access Management (PAM) is an integral component of an organization’s cyber defenses. In this webinar, learn about the benefits of PAM, common use cases, and get an overview of Saviynt CPAM and Microsoft PIM. Read more…
Build a Modern SOC and Stay Ahead of Threats with Microsoft Sentinel
Learn how Microsoft Sentinel can help create a modern SOC powered by AI, automation, and Microsoft’s deep understanding of the threat landscape. Read more…
How Misconfigured Hybrid Identity Setups Can Compromise Cybersecurity
Learn how misconfigured hybrid identity setups can increase your vulnerable attack surface and lead to compromise of Microsoft Entra ID. Read more…
Fortifying Your Cyber Defenses: Mastering Microsoft Defender Against Token Theft and Adversary-in-the-Middle Attacks
Dive into the complex world of cybersecurity and learn how you can use Microsoft Defender to help thwart token theft and adversary-in-the-middle attacks. Read more…