Skip to Content

This browser is no longer supported.

For the best WWT.com experience, please use one of our supported browsers.

Safari Logo Safari Chrome Logo Chrome Firefox Logo Firefox Edge Logo Edge
Search wwt.com...
Top Page Results

See all search results

Featured Solutions
What's trending
?
Home
Solutions & Services
Solutions
Automation & Orchestration
Cloud
Data Center
Digital
Digital Workspace
ESG
Mobility
Networking
Security Transformation
See all Solutions
See all Solutions
Services
Application Services
ATC Lab Services
Consulting Services
Customer Success
Infrastructure Services
Mergers & Acquisitions
Strategic Resourcing
Supply Chain & Integration
See all Services
See all Services
Industries
Utilities
Financial Services
Global Service Provider
Healthcare
Life Sciences
Manufacturing
Oil & Gas
Public Sector
Retail
See all Industries
See all Industries
Partners
Cisco
Dell Technologies
HPE
NetApp
VMware
f5
Intel
Microsoft
Palo Alto
See all Partners
See all Partners
Learning & Support
ATC
Communities
Events
Labs
Research
About
Footer Links
Careers
Contact Us
Diversity & Inclusion
Locations
News
Sustainability
TEC37 WWT Research Security Strategy Security Transformation
Webinar

TEC37 Security Series E07: 5 Pillars of Identity and Access Management

  • Details
  • Select an Option

Event Overview

Identity and access management (IAM) is a balancing act. On the one hand, organizations need to mature their capabilities as corporate assets increasingly live outside the traditional security perimeter. On the other hand, this can't come at the cost of complicating the end-user experience. By focusing on five pillars of IAM, organizations can strike a balance, and give the right users the right level of access to enterprise resources at the right time. Join host Robb Boyd as he speaks with WWT's Mike Wampler, Principal Security Consultant, and Maafu Shabaz, Principal Consultant. They'll discuss how organizations can adopt identity principles and practices to drive a cohesive, strategic approach to IAM.

Goals and Objectives

After attending, you'll have a better understanding of the five pillars of IAM and how you can apply them to your business. You'll also be well positioned to navigate IAM requirements and challenges as your organization matures its security capabilities.

Who should attend?

Managing Directors, Executive Directors, CISOs, CSOs, Security Product Owners and Information Security Personnel.

Presenters

User Profile Picture

Robb Boyd

Explainerds.net

Chief Nerd

User Profile Picture

Mike Wampler

World Wide Technology

Identity & Access Management Practice Manager

User Profile Picture

Maafu Shabaz

World Wide Technology

Principal Security Consultant

Invite people to join this event

© World Wide Technology. All Rights Reserved
  • About
  • Careers
  • Locations
  • News
  • Press Kit
  • Contact Us
  • Privacy Policy
  • Acceptable Use Policy
  • Quality
  • Information Security
  • Supplier Management
  • Cookies