For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Gartner IAM Happy Hour | Ring of Honor @ Cowboys Golf Club

We are sorry, the event "Gartner IAM Happy Hour | Ring of Honor @ Cowboys Golf Club" has already expired.

You may also be interested in.

Disrupting cyberattacks in flight
White Paper
Disrupting cyberattacks in flight
Disrupting cyberattacks in flight
Discover how you can instantly lock down critical assets with Security Guardian Shields Up from Quest.
Read White Paper
Shields Up: Disrupting Identity Attacks in Flight
On Demand Webcast
Shields Up: Disrupting Identity Attacks in Flight
Shields Up: Disrupting Identity Attacks in Flight
Delve into the rising threat landscape, emphasizing the critical need for rapid response mechanisms—akin to a panic button—when an imminent threat is detected.
Watch Webcast
TEC Talk: The Trauma That Binds US: AD Disaster Recovery
On Demand Webcast
TEC Talk: The Trauma That Binds US: AD Disaster Recovery
TEC Talk: The Trauma That Binds US: AD Disaster Recovery
Find out how to stop the damage and respond with purpose in this informative, dynamic and empathetic TEC Talk where the disaster recovery lifecycle will be dissected from the seats of a technical expert, an IT risk consultant and product owner.
Watch Webcast
TEC Talk: Trust, Verify, and Govern: Advancing Beyond Authentication in the Cloud and AI Era
On Demand Webcast
TEC Talk: Trust, Verify, and Govern: Advancing Beyond Authentication in the Cloud and AI Era
TEC Talk: Trust, Verify, and Govern: Advancing Beyond Authentication in the Cloud and AI Era
Covering the progression of identity governance, moving from traditional on-premises methodologies to contemporary approaches in a technology-driven world.
Watch Webcast
TEC Talk Understanding Power BI Tenant to Tenant Migration Concepts and Component Dependencies
On Demand Webcast
TEC Talk Understanding Power BI Tenant to Tenant Migration Concepts and Component Dependencies
TEC Talk Understanding Power BI Tenant to Tenant Migration Concepts and Component Dependencies
This session provides an understanding of the Power BI Service components and how these link together in order to plan and perform a migration of Power BI Workspaces.
Watch Webcast
Improve security, management and productivity through Active Directory modernization
E-book
Improve security, management and productivity through Active Directory modernization
Improve security, management and productivity through Active Directory modernization
Learn how to secure your AD infrastructure and stay resilient against modern cyber threats with this AD modernization e-book.
Read E-book
Spotlight Your Tier 0 Assets: Free ITDR Webinar
On Demand Webcast
Spotlight Your Tier 0 Assets: Free ITDR Webinar
Spotlight Your Tier 0 Assets: Free ITDR Webinar
Every organization has Tier 0 assets—those critical accounts, groups, and objects that need to be safeguarded to keep your identify provider (Active Directory, Entra ID, etc.) out of malicious hands.
Watch Webcast
TEC Talk: Fantastic Tokens in Microsoft Entra ID and How to Protect Them
On Demand Webcast
TEC Talk: Fantastic Tokens in Microsoft Entra ID and How to Protect Them
TEC Talk: Fantastic Tokens in Microsoft Entra ID and How to Protect Them
Token artifacts take the essential role in the process of verifying identity of the user and obtaining an access to resources in Microsoft Entra. It's important to consider token theft scenarios which allow to steal those artifacts and use them elsewhere.
Watch Webcast