Virtual Event

TEC37 Security Series E07: 5 Pillars of Identity and Access Management

1 hr

Event Overview

User Profile Picture
Sarah Moran

Goals & Objectives

After attending, you’ll have a better understanding of the five pillars of IAM and how you can apply them to your business. You’ll also be well positioned to navigate IAM requirements and challenges as your organization matures its security capabilities.

Who should attend?

Managing Directors, Executive Directors, CISOs, CSOs, Security Product Owners and Information Security Personnel.
Registering is free and only takes a minute.