The 8 Critical Areas of Consumer Identity and Access Management to Prepare for in 2018
- LANGUAGE: English DATE: Thursday, October 12, 2017 TIME: 4:00pm CEST, 10:00am ET, 7:00am PT
Many organizations are currently looking into deploying their own CIAM programs, because they recognize CIAM’s potential to provide better marketing insights, improve customer registration experience and increase security. However, in the light of the upcoming data protection regulations like GDPR, which will profoundly change the way personal information collection is regulated, you must be especially careful and well-prepared for hot inter-departmental discussions concerning your future CIAM plans. Remember: even an inadvertent violation of the new compliance regulations can be extremely costly.
In this webinar, you will learn about 4 major functional areas of CIAM and the business value they can deliver:
- Consent management
- Authentication trends
- Improved user experiences
In the first part of this webinar, John Tolbert, Lead Analyst at KuppingerCole, will describe how Consumer Identity solutions differ from traditional IAM systems. He will cover the 8 functional areas listed above.
In the second part, Eric Maass, Director of Identity and Access Management Strategy at IBM, will provide detailed recommendations for planning a successful CIAM program for the highly connected consumer.
Cybercriminals are growing in number and sophistication, rendering traditional solutions powerless against today’s advanced threats. IBM Security, with close to 8,000 security professionals worldwide, helps more than 10,000 clients address their most critical needs: transforming their security programs; optimizing operations and response systems; and protecting critical information.
During the past decade, IBM has invested more than $2 billion on security research and development, resulting in 3,700+ security-related patents, and acquired 19 security companies to build out its portfolio. Today, IBM Security delivers next-generation security technology and services, including Watson for Cyber Security, a cloud-based version of IBM cognitive technology trained on the language of security.
Malware has been on the rise. Ransomware continues to grab the headlines. New malware variants proliferate by the millions. Old style manual malware analysis can't keep pace. But organizations are increasingly under attack. Fortunately, vendors have been enhancing and improving their products to help their customer successfully defend against these attacks.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 15-18, 2018, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.