Access Governance for today’s agile, connected businesses
- LANGUAGE: English DATE: Tuesday, December 09, 2014 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
Identity and Access Governance providing agility for business processes in the connected world
Artificial constructs such as roles have proven their value in static businesses where the focus was on the internal IT. However, it is difficult to be sufficiently agile with such models given the level of the change organizations are facing. All of the changes take the form of new or changed business processes. These business processes must be the overarching paradigm for Identity and Access Governance. Therefore, following the business process is the necessary foundation for agile Identity and Access Governance. Furthermore, Identity and Access Governance is only one piece in the puzzle of keeping risks for corporate information assets under control. Identity and Access Governance needs to be responsive to real time security information – for example supporting immediate reaction rather than annual scheduled recertification.
In this KuppingerCole Webinar, you will hear about:
- IAM (Identity and Access Management) for the new ABC – agile businesses, connected
- Agile business processes, agile Governance
- From roles to business processes, from static recertification to risk-aware approaches
- Extending IAM by real time cyber threat intelligence
In the first part of this webinar, Mike Small, Fellow Analyst at KuppingerCole, will talk about the challenges agile, connected businesses are facing. He will describe the changing threat landscape in connected enterprise and the need to support business agility through innovative solutions for the management of all identities and access. Knowing who has access to what is a key requirement when changing and creating business processes – and the business process context is a key enabler for agility in Access Governance. He will describe Identity and Access Governance in the wider context of what is needed: When can recertification be scheduled and when is it necessary to react to newly identified threats?
In the second part, Ravi Srinivasan, Director, Strategy and Product Management, IBM Security Systems, will describe how IBM understands and provides security for this new ABC, by supporting Identity and Access Governance in the context of business processes and by integrating IAM with real-time cyber threat intelligence.
Traditional security defenses are no match for today’s well-funded attackers, while disruptive technologies, like Cloud and IoT, introduce new vulnerabilities to exploit. IBM Security, with 8,000 professionals in 133 countries, delivers an immune system of security technology to detect and prevent threats and respond quickly and completely to breaches. During the past decade, IBM has invested more than $2 billion on security research and development, resulting in 3,700+ security-related patents, and acquired 20 security companies to build out its portfolio. Today, IBM Security addresses the evolving security landscape and 17,000 clients’ most critical needs with AI innovation in the cloud and intelligent orchestration. To learn how, please visit ibm.com/security.
PAM (Privileged Access Management) has grown over these years to become a crucial set of technologies that addresses some urgent cybersecurity issues today.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 14-17, 2019, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.