TEC37 Security Series E07: 5 Pillars of Identity and Access Management
Event Overview
Identity and access management (IAM) is a balancing act. On the one hand, organizations need to mature their capabilities as corporate assets increasingly live outside the traditional security perimeter. On the other hand, this can’t come at the cost of complicating the end-user experience. By focusing on five pillars of IAM, organizations can strike a balance, and give the right users the right level of access to enterprise resources at the right time. Join host Robb Boyd as he speaks with WWT’s Mike Wampler, Principal Security Consultant, and Maafu Shabaz, Principal Consultant. They’ll discuss how organizations can adopt identity principles and practices to drive a cohesive, strategic approach to IAM.
What to expect
- The five pillars of IAM: Lifecycle and governance; federation, single sign-on and multi-factor authentication; network access control; privileged account management; and key encryption
- Example scenarios of each pillar
- Recommended industry guidelines and requirements for identity strategies
- How to overcome common IAM pitfalls
Goals and Objectives
After attending, you’ll have a better understanding of the five pillars of IAM and how you can apply them to your business. You’ll also be well positioned to navigate IAM requirements and challenges as your organization matures its security capabilities.
Who should attend?
Managing Directors, Executive Directors, CISOs, CSOs, Security Product Owners and Information Security Personnel.