TEC37 Security Series E07: 5 Pillars of Identity and Access Management

Event Overview

Identity and access management (IAM) is a balancing act. On the one hand, organizations need to mature their capabilities as corporate assets increasingly live outside the traditional security perimeter. On the other hand, this can’t come at the cost of complicating the end-user experience. By focusing on five pillars of IAM, organizations can strike a balance, and give the right users the right level of access to enterprise resources at the right time. Join host Robb Boyd as he speaks with WWT’s Mike Wampler, Principal Security Consultant, and Maafu Shabaz, Principal Consultant. They’ll discuss how organizations can adopt identity principles and practices to drive a cohesive, strategic approach to IAM.

What to expect

In this episode, you'll hear about what's needed to successfully drive IAM across the enterprise. We'll cover the key components of an IAM strategy. You'll learn about:
  • The five pillars of IAM: Lifecycle and governance; federation, single sign-on and multi-factor authentication; network access control; privileged account management; and key encryption
  • Example scenarios of each pillar
  • Recommended industry guidelines and requirements for identity strategies
  • How to overcome common IAM pitfalls

Goals and Objectives

After attending, you’ll have a better understanding of the five pillars of IAM and how you can apply them to your business. You’ll also be well positioned to navigate IAM requirements and challenges as your organization matures its security capabilities.

Who should attend?

Managing Directors, Executive Directors, CISOs, CSOs, Security Product Owners and Information Security Personnel.