Latest from Okta

Your First 30 Days as CFO

Stepping into the CFO role is both exciting and daunting. The first 30 days set the tone for long-term success – but with complex entities, global operations, and fragmented AP workflows, the challenges can feel overwhelming. That’s why we created Your First 30 Days as CFO: A Tactical Playbook. Inside, you’ll learn how to:• Diagnose […]

Read →

6 Lessons for Cybersecurity Leaders

The state of security is highly adrenalized these days — more so than usual. Years into the deadly and disruptive global pandemic, not only are we still seeing more attacks, we’re also seeing more breaches, as the way many of us work continues to evolve. New global research conducted by Splunk and the Enterprise Strategy […]

Read →

The Winning Formula for Loyalty Programs: Balancing Customer Experience, Security, and Privacy

Watch this webinar on-demand featuring PwC and Okta, where we will delve into the success story of how a Customer Identity Cloud (CIC) playbook at Wyndham was implemented, one of the world’s largest hotel chains. Discover how this implementation enabled Wyndham to enhance their user experience, fortify their security framework, and helped achieve significant operational […]

Read →

The Winning Formula for Loyalty Programs: Balancing Customer Experience, Security, and Privacy

Winning loyalty programs ensure that only legitimate customers are able to access their loyalty accounts and that those accounts are easily accessible and reflect their preferences and behaviors. This is not easy when customer Identity is fragmented across technology. Identity fragmentation impacts an organization’s ability to effectively track, analyze and secure customer data. Watch this […]

Read →

Multi-factor authentication deployment guide

As we’ve seen threats to password security increase in recent years, multi-factor authentication (MFA) has gained rapid adoption. For consumer and enterprise web and mobile applications, it’s become a key method of increasing authentication assurance. In this guide, we cover a lot of ground around authentication. First, we review the results of a survey, completed […]

Read →

Beyond Login: Maximizing CIAM’s Security Capabilities

Discover how Customer Identity and Access Management (CIAM) can enhance your security. Learn to battle bots, fake signups, and stolen credentials while streamlining authentication and authorization. Key Takeaways:• The importance of CIAM for securing customer data.• Identifying and mitigating identity threats.• Using phishing-resistant methods like passkeys.• Benefits of an adaptable CIAM solution. Speakers:Linda Gong, Product […]

Read →

Building a Flexible, Agile Enterprise with Identity

In just the last three years, Global 2000 executives have had to navigate their businesses through a pandemic, a geopolitical conflict, and a period of economic uncertainty. That means constantly optimizing for an efficient, cost-effective, and flexible organizational structure–especially when undergoing transformations like mergers and acquisitions, global expansion, and divestitures or restructuring. For large organizations, […]

Read →
25,000+
Articles
500K+
Monthly Readers
300+
Sponsors
15+
Years of Insights