Cognitive Technologies and the Future of Identity & Access Management

  • LANGUAGE: English DATE: Thursday, September 14, 2017 TIME: 4:00pm CEST, 10:00am ET, 7:00am PT
Upcoming Webinars
Cognitive Technologies and the Future of Identity & Access Management

Like any other field of information technology, identity and access management has been rapidly evolving to meet new business challenges created by the Digital Transformation. As modern businesses are becoming increasingly open and interconnected, IAM solutions now need to cover not just employees, but customers, partners and smart IoT devices. They must be able to handle the growing complexity of managing and monitoring access to the company’s most valuable digital assets, regardless of their format, location or scale, while still maintaining compliance and protecting them from cyber risks.

Traditional enterprise IAM solutions still largely follow the siloed approach, with different departments and teams responsible for managing individual IT systems. Increasing complexity of IAM systems, especially for the largest, geographically distributed companies can also substantially reduce other employee’s business productivity, to say nothing about uncovering and mitigating security incidents. Next-generation IAM systems should be capable of utilizing continuous learning and reasoning to support humans in their decision-making and help them perform their tasks more quickly. Applications of cognitive technologies to cyber-security and IAM promise just that.

In this webinar, you will learn about:

  • Current state and the hottest trends in Cognitive Security and IAM;
  • Modernizing IAM for better operational efficiency, cyber-resilience and privacy protection;
  • Unique challenges of IAM programs for large international enterprises and how application of cognitive principles helps alleviate them;
  • IBM’s latest developments in the field of Cognitive IAM and Access Governance.

In the first part of the webinar, Martin Kuppinger, founder and Principal Analyst at KuppingerCole, will provide an overview of cognitive solutions, in particular cognitive security, and then look at the potential cognitive technologies hold for the domain of IAM. He will clarify terminology and unveil the potential of these technologies – and why they now are ready for broad-scale use.

In the second part, Raghu Dev, IAM Strategy Lead at IBM, will present the use of cognitive technologies to solve the problem at hand. He will talk about cognition as defined in IBM, drivers that support this disruptive thinking and the necessity of building a basic risk aware cognitive Identity and access management system. Moreover, he will talk about the challenges and solutions inherent in making a cognitive solution work in practice.


Speakers

Raghu Dev is currently Identity and Access Management Strategy leader for IBM in the IBM CIO office, prior to that, he was the Global Identity & Access Management Services Leader at IBM. Before joining IBM he led the North American Identity & Access Management, Database Security Solution...


Lead Sponsor

Traditional security defenses are no match for today’s well-funded attackers, while disruptive technologies, like Cloud and IoT, introduce new vulnerabilities to exploit. IBM Security, with 8,000 professionals in 133 countries, delivers an immune system of security technology to detect and prevent threats and respond quickly and completely to breaches. During the past decade, IBM has invested more than $2 billion on security research and development, resulting in 3,700+ security-related patents, and acquired 20 security companies to build out its portfolio. Today, IBM Security addresses the evolving security landscape and 17,000 clients’ most critical needs with AI innovation in the cloud and intelligent orchestration. To learn how, please visit ibm.com/security. 

Watch now

Downloads

Webinar presentation, KuppingerCole

Webinar presentation, IBM

Webcast download

Popular Webcasts

Next Webinar

Webinar

How to Stop Attacker Movement in Your Network Before They Reach your “Crown Jewels”

Nearly all high-impact cyberattacks have a phase in which the attacker must conduct lateral movement from their initial landing point to their ultimate target. To do this, the attacker needs a combination of credentials and available connections between one system and another. This is the evasive process of “living off the land” using the connectivity native to the organization.

Next Conference

Conference

Blockchain Enterprise Days 2019

Blockchain is still on everyone’s lips and the 2019 can be the year when large enterprises finally embrace the distributed ledger technology. KuppingerCole's inaugural blockchain-themed event will go beyond the hype and will present you real use cases and applications for your enterprise. Blockchain Enterprise Days (#BeDays19) will take place on September 18-19, 2019 in Frankfurt, Germany.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00