TEC37 Security Series E07: 5 Pillars of Identity and Access Management
Identity and access management (IAM) is a balancing act. On the one hand, organizations need to mature their capabilities as corporate assets increasingly live outside the traditional security perimeter. On the other hand, this can't come at the cost of complicating the end-user experience. By focusing on five pillars of IAM, organizations can strike a balance, and give the right users the right level of access to enterprise resources at the right time. Join host Robb Boyd as he speaks with WWT's Mike Wampler, Principal Security Consultant, and Maafu Shabaz, Principal Consultant. They'll discuss how organizations can adopt identity principles and practices to drive a cohesive, strategic approach to IAM.
After attending, you'll have a better understanding of the five pillars of IAM and how you can apply them to your business. You'll also be well positioned to navigate IAM requirements and challenges as your organization matures its security capabilities.
Managing Directors, Executive Directors, CISOs, CSOs, Security Product Owners and Information Security Personnel.