How to Make Your IAM Program a Success

  • LANGUAGE: English DATE: Thursday, February 22, 2018 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
Upcoming Webinars
How to Make Your IAM Program a Success Recommendations From the Field

Identity and Access Management (IAM) is one of the most important and challenging disciplines, involving multiple departments and systems across the enterprise and requiring constant communication between the business and IT. Without IAM, it is difficult to mitigate access risks, to comply with regulations and to deliver a consistent and frictionless user experience.

The best way to ensure the success of your company’s IAM program is to follow in the footsteps of organizations whose programs have proven successful, learn from their leading IAM experts and avoid common mistakes.

KuppingerCole has compiled a list of recommendations and best practices based on a series of interviews with enterprise security architects, IAM leads, CISOs and other executives from a number of large enterprise organizations in different industries across the globe.

Join this webinar and learn how to succeed with IAM; receive recommendations for organizational and process aspects of rolling out a successful IAM program and learn how to make it ready for inevitable future changes.

Here are just a few of the topics that will be discussed:

  • Helping your stakeholders understand the business benefits of the program to gain support at the board level and secure the budget;
  • Setting the right expectations and planning the available resources to ensure quick wins;
  • Planning the IAM organization, establishing communications between departments and third parties;
  • Defining compliant, sustainable and efficient IAM processes based on best practices;
  • Harnessing the latest IAM developments such as Identity as a Service, Adaptive Authentication, User Behavior Analytics and even Blockchain!

In the first part of the webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will outline the challenges companies are facing when planning their IAM programs and provide detailed recommendations on selecting the right tools, defining proper organizational processes and staying up-to-date with the latest trends in IAM.

In the second part, Martin will be joined by two speakers from customer organizations and a speaker from One Identity who will offer their insights into the organizational and technical details of their successful IAM programs and share their own experiences, tips and recommendations in a panel-like discussion.

Tom Golson, Associate Director of IT Security Operations at the Texas A&M University, will talk about challenges of implementing unified identities across a multitude of systems on the campus.

Wolfgang Zwerch, Corporate Security Architect for Global IAM at Munich Re (Group), will share his experience of running a successful multi-year IAM program for an international company in a highly-regulated industry.

Paul Walker, Technical Director at One Identity, will provide some practical advice for those about to embark on an IAM journey and share experience gathered over 20 years in helping customers achieve their goals.


Paul Walker is a subject matter expert specialising in the field of IAM for over 20 years. After graduating with a BSc in Computer Science in 1995 he has worked solely in the world of software security and working with IAM since 2001.Paul has held global consulting, sales and product management...

Wolfgang Zwerch was born 1971 and studied computer science at the university of applied science in Augsburg. He has experience in different areas of IT for more than 18 years. Before joining Munich Re he worked for CSC as an IT Security and Identity Management leading consultant for nearly 10...

Lead Sponsor

One Identity delivers unified identity security solutions that help customers strengthen their overall cybersecurity posture and protect the people, applications and data essential to business. Our Unified Identity Security Platform brings together best-in-class software to enable organizations to shift from a fragmented to a holistic approach to identity security.

Watch now


Trending Videos

Next Webinar


Unify Identity and Security to Block Identity Based Cyber Attacks

Compromised credentials are a top cyber-attack method. Identity-based attacks are on the rise, it is therefore vital that businesses can detect the misuse of enterprise identities to block attackers from getting unfettered insider access to IT systems and data. But that can be challenging in today’s distributed, hybrid, and multi-cloud business IT environment.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00