Access Governance for today’s agile, connected businesses

  • LANGUAGE: English DATE: Tuesday, December 09, 2014 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
Upcoming Webinars

Identity and Access Governance providing agility for business processes in the connected world

In today’s fast changing world the digitalization of businesses is essential to keep pace. The new ABC – Agile Businesses Connected – is the new paradigm organizations must follow. They must connect to their customers, partners and associates. They must become agile to respond to the changing needs of the market. They must understand, manage, and mitigate the risks in this connected world. One important aspect of this is the governance of the ever-increasing number of identities – customers, things, together with their access.

Artificial constructs such as roles have proven their value in static businesses where the focus was on the internal IT. However, it is difficult to be sufficiently agile with such models given the level of the change organizations are facing. All of the changes take the form of new or changed business processes. These business processes must be the overarching paradigm for Identity and Access Governance. Therefore, following the business process is the necessary foundation for agile Identity and Access Governance. Furthermore, Identity and Access Governance is only one piece in the puzzle of keeping risks for corporate information assets under control. Identity and Access Governance needs to be responsive to real time security information – for example supporting immediate reaction rather than annual scheduled recertification.

In this KuppingerCole Webinar, you will hear about:

  • IAM (Identity and Access Management) for the new ABC – agile businesses, connected
  • Agile business processes, agile Governance
  • From roles to business processes, from static recertification to risk-aware approaches
  • Extending IAM by real time cyber threat intelligence

In the first part of this webinar, Mike Small, Fellow Analyst at KuppingerCole, will talk about the challenges agile, connected businesses are facing. He will describe the changing threat landscape in connected enterprise and the need to support business agility through innovative solutions for the management of all identities and access. Knowing who has access to what is a key requirement when changing and creating business processes – and the business process context is a key enabler for agility in Access Governance. He will describe Identity and Access Governance in the wider context of what is needed:  When can recertification be scheduled and when is it necessary to react to newly identified threats?

In the second part, Ravi Srinivasan, Director, Strategy and Product Management, IBM Security Systems, will describe how IBM understands and provides security for this new ABC, by supporting Identity and Access Governance in the context of business processes and by integrating IAM with real-time cyber threat intelligence.


Platinum Sponsors

Speakers

Ravi Srinivasan directs the IBM identity, access and mainframe security portfolio strategy and product management based in Austin, Texas. He has over 15 years of experience in product management, market strategy, and development in software and services industries. Ravi meets and consults with...


Platinum Sponsor

Traditional security defenses are no match for today’s well-funded attackers, while disruptive technologies, like Cloud and IoT, introduce new vulnerabilities to exploit. IBM Security, with 8,000 professionals in 133 countries, delivers an immune system of security technology to detect and prevent threats and respond quickly and completely to breaches. During the past decade, IBM has invested more than $2 billion on security research and development, resulting in 3,700+ security-related patents, and acquired 20 security companies to build out its portfolio. Today, IBM Security addresses the evolving security landscape and 17,000 clients’ most critical needs with AI innovation in the cloud and intelligent orchestration. To learn how, please visit ibm.com/security. 

Watch now

Downloads

Presentation, KuppingerCole

Presentation, IBM

Webcast download

Popular Webcasts

Next Webinar

Webinar

Improve Security With Critical Infrastructures Requirements

Organizations or institutions that are essential for the public are called Critical Infrastructures (KRITIS = “Kritische Infrastrukturen”). As such, they are subject to comprehensive and strict legal regimes consisting of laws and regulations.

Next Conference

Congress

European Identity & Cloud Conference 2020

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Next Seminar

Training

KC Master Class - PAM for the 2020s

KuppingerCole analysts build upon competencies from comprehensive research, experience from highly topical PAM advisory projects and systematically expanded and advanced best practices. Our analysts and advisors offer a one-of-a-kind, multi-channel approach to modern knowledge transfer: the KuppingerCole Master Class Privileged Access Management. Webinars and webcasts, up-to-date research documents, an all-day classroom workshop with final exam and certification of the acquired skills lay the foundation for establishing the necessary technical and methodological knowledge in your own organization.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00