Ground Control to Major CRO: Is Identity Governance a risky experience?
- LANGUAGE: English DATE: Tuesday, June 02, 2015 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Identity and Access Governance managing business risk in the connected world
Every access right is a potential risk and the greater the number of users, the larger the number of access rights, the higher the access risk. The objective of risk management is to reduce the business impact of a risk or the probability that it will occur. Both of these dimensions are very difficult to define and measure, in addition many technical controls are hard to relate to business objectives. In practice, access risk can be considered to be a combination of factors that can be used as key performance indicators associated with business groups, processes and applications to visualize how business risk changes over time in response to the implementation of policies and controls.
In this KuppingerCole Webinar, you will hear about:
- How the digitization of business is changing the risk landscape.
- Why identity governance is critical to managing these new risks – access is the new security perimeter.
- Why a business centric approach is needed – moving from entitlements to business activities.
- How identity governance reduces the cost of compliance as well as improving security posture.
In the first part of this webinar, Mike Small, Fellow Analyst at KuppingerCole, will talk about the challenges agile, connected businesses are facing. He will describe the changing threat landscape in connected enterprises and the need to support business agility through innovative solutions for the management of all identities and access. Knowing who has access to what is a key requirement to managing risk but this needs to be understood in a business rather than a technology context. He will describe Identity and Access Governance in the wider context of what is needed and the business value it provides. How the correct approach can reduce the cost of compliance as well as improving the risk posture.
In the second part, Andrea Rossi from IBM Security Systems, will describe how IBM understands and provides security for the new agile business connected, by supporting Identity and Access Governance in the context of business operations and by integrating IAM with real-time cyber threat intelligence.
Traditional security defenses are no match for today’s well-funded attackers, while disruptive technologies, like Cloud and IoT, introduce new vulnerabilities to exploit. IBM Security, with 8,000 professionals in 133 countries, delivers an immune system of security technology to detect and prevent threats and respond quickly and completely to breaches. During the past decade, IBM has invested more than $2 billion on security research and development, resulting in 3,700+ security-related patents, and acquired 20 security companies to build out its portfolio. Today, IBM Security addresses the evolving security landscape and 17,000 clients’ most critical needs with AI innovation in the cloud and intelligent orchestration. To learn how, please visit ibm.com/security.
PAM (Privileged Access Management) has grown over these years to become a crucial set of technologies that addresses some urgent cybersecurity issues today.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 14-17, 2019, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.