Discover the Microsoft Entra Suite
Learn how to leverage the Microsoft Entra Suite to streamline identity and access management processes, enhance security, and ensure compliance with industry regulations. Read more…
Ensuring ICAM Survivability and Tactical Edge Continuity for DDIL Environments
Whether the disruption is anticipated or unexpected, DOD units must retain uninterrupted access to mission-critical systems to conduct assigned missions, which includes ICAM. Learn about OCG’s solution for identity continuity. Read more…
Securing Academic Partnerships: Overcoming Identity Challenges in Collaborative Higher Education Environments
In this webinar, we’ll look at how to improve your identity systems to better protect your users and data while making sure collaboration remains secure and effortless. Read more…
Exploring Microsoft’s Security Service Edge (SSE) Solution
Get an in-depth look at Microsoft’s newly launched Security Service Edge (SSE), including key components such as Microsoft Entra Private Access and Internet Access. Read more…
Transitioning from MIM to Microsoft Entra for Cloud-First IAM
OCG CTO James Cowling presents five different options for transitioning from on-premises MIM to a Microsoft-Entra focused solution. Read more…
The Rise of AI Threats: Identity Management
Join guest speaker John Howie to learn about the rising threat of AI to identity management systems, and what steps you can take today to protect your organization. Read more…
Understanding Privileged Access Management (PAM)
Privileged Access Management (PAM) is an integral component of an organization’s cyber defenses. In this webinar, learn about the benefits of PAM, common use cases, and get an overview of Saviynt CPAM and Microsoft PIM. Read more…
Transform Your Security Strategy with Microsoft Sentinel and a Modern Managed SOC
Learn how Microsoft Sentinel can help create a modern SOC powered by AI, automation, and Microsoft’s deep understanding of the threat landscape. Read more…
How Misconfigured Hybrid Identity Setups Can Compromise Cybersecurity
Learn how misconfigured hybrid identity setups can increase your vulnerable attack surface and lead to compromise of Microsoft Entra ID. Read more…
Fortifying Your Cyber Defenses: Mastering Microsoft Defender Against Token Theft and Adversary-in-the-Middle Attacks
Dive into the complex world of cybersecurity and learn how you can use Microsoft Defender to help thwart token theft and adversary-in-the-middle attacks. Read more…