The 8 Critical Areas of Consumer Identity and Access Management to Prepare for in 2018
- LANGUAGE: English DATE: Thursday, October 12, 2017 TIME: 4:00pm CEST, 10:00am ET, 7:00am PT
Many organizations are currently looking into deploying their own CIAM programs, because they recognize CIAM’s potential to provide better marketing insights, improve customer registration experience and increase security. However, in the light of the upcoming data protection regulations like GDPR, which will profoundly change the way personal information collection is regulated, you must be especially careful and well-prepared for hot inter-departmental discussions concerning your future CIAM plans. Remember: even an inadvertent violation of the new compliance regulations can be extremely costly.
In this webinar, you will learn about 4 major functional areas of CIAM and the business value they can deliver:
- Consent management
- Authentication trends
- Improved user experiences
In the first part of this webinar, John Tolbert, Lead Analyst at KuppingerCole, will describe how Consumer Identity solutions differ from traditional IAM systems. He will cover the 8 functional areas listed above.
In the second part, Eric Maass, Director of Identity and Access Management Strategy at IBM, will provide detailed recommendations for planning a successful CIAM program for the highly connected consumer.
Cybercriminals are growing in number and sophistication, rendering traditional solutions powerless against today’s advanced threats. IBM Security, with close to 8,000 security professionals worldwide, helps more than 10,000 clients address their most critical needs: transforming their security programs; optimizing operations and response systems; and protecting critical information.
During the past decade, IBM has invested more than $2 billion on security research and development, resulting in 3,700+ security-related patents, and acquired 19 security companies to build out its portfolio. Today, IBM Security delivers next-generation security technology and services, including Watson for Cyber Security, a cloud-based version of IBM cognitive technology trained on the language of security.
Ohne Zweifel ist der 25. Mai 2018 im Kalender jedes IT-Spezialisten rot angestrichen. Denn an diesem Tag tritt die neue Datenschutz-Grundverordnung (General Data Protection Regulation, GDPR) in Kraft, welche die Art und Weise, in der personenbezogene Daten von in der EU ansässigen Unternehmen oder anderen Unternehmen, die in der Europäischen Union geschäftlich tätig sein möchten, behandelt werden, grundsätzlich verändert. Nachhaltig beeindruckt von den strengen Strafen, die im Rahmen der neuen Verordnung vorgesehen sind, sind Unternehmen eilig bemüht, sich auf die neuen rechtlichen, betrieblichen und technischen Herausforderungen vorzubereiten.
Managing customer information in a digitally transformed economy with numerous business partners demanding access is one of the most significant challenges today, and it will continue to evolve rapidly. Besides that, the challenge is to offer user-friendly login procedures via social media accounts, passwords or biometric devices while securing and respecting personal data at the same time CIW Europe is a joint Event with our Partner CXP (Le Groupe CXP, Paris, France).