Cognitive Technologies and the Future of Identity & Access Management

  • LANGUAGE: English DATE: Thursday, September 14, 2017 TIME: 4:00pm CEST, 10:00am ET, 7:00am PT
Upcoming Webinars
Cognitive Technologies and the Future of Identity & Access Management
Like any other field of information technology, identity and access management has been rapidly evolving to meet new business challenges created by the Digital Transformation. As modern businesses are becoming increasingly open and interconnected, IAM solutions now need to cover not just employees, but customers, partners and smart IoT devices. They must be able to handle the growing complexity of managing and monitoring access to the company’s most valuable digital assets, regardless of their format, location or scale, while still maintaining compliance and protecting them from cyber risks.

Traditional enterprise IAM solutions still largely follow the siloed approach, with different departments and teams responsible for managing individual IT systems. Increasing complexity of IAM systems, especially for the largest, geographically distributed companies can also substantially reduce other employee’s business productivity, to say nothing about uncovering and mitigating security incidents. Next-generation IAM systems should be capable of utilizing continuous learning and reasoning to support humans in their decision-making and help them perform their tasks more quickly. Applications of cognitive technologies to cyber-security and IAM promise just that.

In this webinar, you will learn about:

  • Current state and the hottest trends in Cognitive Security and IAM;
  • Modernizing IAM for better operational efficiency, cyber-resilience and privacy protection;
  • Unique challenges of IAM programs for large international enterprises and how application of cognitive principles helps alleviate them;
  • IBM’s latest developments in the field of Cognitive IAM and Access Governance.

In the first part of the webinar, Martin Kuppinger, founder and Principal Analyst at KuppingerCole, will provide an overview of cognitive solutions, in particular cognitive security, and then look at the potential cognitive technologies hold for the domain of IAM. He will clarify terminology and unveil the potential of these technologies – and why they now are ready for broad-scale use.

In the second part, Raghu Dev, IAM Strategy Lead at IBM, will present the use of cognitive technologies to solve the problem at hand. He will talk about cognition as defined in IBM, drivers that support this disruptive thinking and the necessity of building a basic risk aware cognitive Identity and access management system. Moreover, he will talk about the challenges and solutions inherent in making a cognitive solution work in practice.


Speakers

Raghu Dev is currently Identity and Access Management Strategy leader for IBM in the IBM CIO office, prior to that, he was the Global Identity & Access Management Services Leader at IBM. Before joining IBM he led the North American Identity & Access Management, Database Security Solution...


Lead Sponsor

Cybercriminals are growing in number and sophistication, rendering traditional solutions powerless against today’s advanced threats. IBM Security, with close to 8,000 security professionals worldwide, helps more than 10,000 clients address their most critical needs: transforming their security programs; optimizing operations and response systems; and protecting critical information.

During the past decade, IBM has invested more than $2 billion on security research and development, resulting in 3,700+ security-related patents, and acquired 19 security companies to build out its portfolio. Today, IBM Security delivers next-generation security technology and services, including Watson for Cyber Security, a cloud-based version of IBM cognitive technology trained on the language of security.

Watch now

Downloads

Webinar presentation, KuppingerCole

Webinar presentation, IBM

Webcast download

Popular Webcasts

Next Webinar

Webinar

The Crucial Role of Identity in Securing Industrial IoT

As more and more consumers, businesses, public sector companies and even whole countries are embracing the Digital Transformation, smart devices of all types are proliferating in all areas of our daily lives. It is safe to say, however, that, after the initial rush of making every device in the world smart and connected, the Internet of Things has already passed the peak of inflated expectations, with both vendors and users of the technology finally starting to care more about such things as interoperability and security.

Next Conference

Conference

Consumer Identity World Tour 2017

The Consumer Identity World Tour is the place where you can dive deeper into the world of CIAM. Learn more about privacy by design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00