Cognitive Technologies and the Future of Identity & Access Management
- LANGUAGE: English DATE: Thursday, September 14, 2017 TIME: 4:00pm CEST, 10:00am ET, 7:00am PT
Like any other field of information technology, identity and access management has been rapidly evolving to meet new business challenges created by the Digital Transformation. As modern businesses are becoming increasingly open and interconnected, IAM solutions now need to cover not just employees, but customers, partners and smart IoT devices. They must be able to handle the growing complexity of managing and monitoring access to the company’s most valuable digital assets, regardless of their format, location or scale, while still maintaining compliance and protecting them from cyber risks.
Traditional enterprise IAM solutions still largely follow the siloed approach, with different departments and teams responsible for managing individual IT systems. Increasing complexity of IAM systems, especially for the largest, geographically distributed companies can also substantially reduce other employee’s business productivity, to say nothing about uncovering and mitigating security incidents. Next-generation IAM systems should be capable of utilizing continuous learning and reasoning to support humans in their decision-making and help them perform their tasks more quickly. Applications of cognitive technologies to cyber-security and IAM promise just that.
In this webinar, you will learn about:
- Current state and the hottest trends in Cognitive Security and IAM;
- Modernizing IAM for better operational efficiency, cyber-resilience and privacy protection;
- Unique challenges of IAM programs for large international enterprises and how application of cognitive principles helps alleviate them;
- IBM’s latest developments in the field of Cognitive IAM and Access Governance.
In the first part of the webinar, Martin Kuppinger, founder and Principal Analyst at KuppingerCole, will provide an overview of cognitive solutions, in particular cognitive security, and then look at the potential cognitive technologies hold for the domain of IAM. He will clarify terminology and unveil the potential of these technologies – and why they now are ready for broad-scale use.
In the second part, Raghu Dev, IAM Strategy Lead at IBM, will present the use of cognitive technologies to solve the problem at hand. He will talk about cognition as defined in IBM, drivers that support this disruptive thinking and the necessity of building a basic risk aware cognitive Identity and access management system. Moreover, he will talk about the challenges and solutions inherent in making a cognitive solution work in practice.
Traditional security defenses are no match for today’s well-funded attackers, while disruptive technologies, like Cloud and IoT, introduce new vulnerabilities to exploit. IBM Security, with 8,000 professionals in 133 countries, delivers an immune system of security technology to detect and prevent threats and respond quickly and completely to breaches. During the past decade, IBM has invested more than $2 billion on security research and development, resulting in 3,700+ security-related patents, and acquired 20 security companies to build out its portfolio. Today, IBM Security addresses the evolving security landscape and 17,000 clients’ most critical needs with AI innovation in the cloud and intelligent orchestration. To learn how, please visit ibm.com/security.
Organizations or institutions that are essential for the public are called Critical Infrastructures (KRITIS = “Kritische Infrastrukturen”). As such, they are subject to comprehensive and strict legal regimes consisting of laws and regulations.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.
KuppingerCole analysts build upon competencies from comprehensive research, experience from highly topical PAM advisory projects and systematically expanded and advanced best practices. Our analysts and advisors offer a one-of-a-kind, multi-channel approach to modern knowledge transfer: the KuppingerCole Master Class Privileged Access Management. Webinars and webcasts, up-to-date research documents, an all-day classroom workshop with final exam and certification of the acquired skills lay the foundation for establishing the necessary technical and methodological knowledge in your own organization.