How to Make Your IAM Program a Success
- LANGUAGE: English DATE: Thursday, February 22, 2018 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
Identity and Access Management (IAM) is one of the most important and challenging disciplines, involving multiple departments and systems across the enterprise and requiring constant communication between the business and IT. Without IAM, it is difficult to mitigate access risks, to comply with regulations and to deliver a consistent and frictionless user experience.
The best way to ensure the success of your company’s IAM program is to follow in the footsteps of organizations whose programs have proven successful, learn from their leading IAM experts and avoid common mistakes.
KuppingerCole has compiled a list of recommendations and best practices based on a series of interviews with enterprise security architects, IAM leads, CISOs and other executives from a number of large enterprise organizations in different industries across the globe.
Join this webinar and learn how to succeed with IAM; receive recommendations for organizational and process aspects of rolling out a successful IAM program and learn how to make it ready for inevitable future changes.
Here are just a few of the topics that will be discussed:
- Helping your stakeholders understand the business benefits of the program to gain support at the board level and secure the budget;
- Setting the right expectations and planning the available resources to ensure quick wins;
- Planning the IAM organization, establishing communications between departments and third parties;
- Defining compliant, sustainable and efficient IAM processes based on best practices;
- Harnessing the latest IAM developments such as Identity as a Service, Adaptive Authentication, User Behavior Analytics and even Blockchain!
In the first part of the webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will outline the challenges companies are facing when planning their IAM programs and provide detailed recommendations on selecting the right tools, defining proper organizational processes and staying up-to-date with the latest trends in IAM.
In the second part, Martin will be joined by two speakers from customer organizations and a speaker from One Identity who will offer their insights into the organizational and technical details of their successful IAM programs and share their own experiences, tips and recommendations in a panel-like discussion.
Tom Golson, Associate Director of IT Security Operations at the Texas A&M University, will talk about challenges of implementing unified identities across a multitude of systems on the campus.
Wolfgang Zwerch, Corporate Security Architect for Global IAM at Munich Re (Group), will share his experience of running a successful multi-year IAM program for an international company in a highly-regulated industry.
Paul Walker, Technical Director at One Identity, will provide some practical advice for those about to embark on an IAM journey and share experience gathered over 20 years in helping customers achieve their goals.
City Gate Park Mahon Point • Cork • Ireland
One Identity provides identity-centric cybersecurity that protects the people, applications and data essential to business. We verify everything, so that each user has the right access, at the right time, for the right reason. Our Unified Identity-Centric Security Platform brings together best-in-class Privileged Access Management (PAM), Identity Governance and Administration (IGA), and Active Directory Management and Security (ADMS) capabilities to mitigate cybersecurity exposure. One Identity is trusted and proven on a global scale – managing more than 250 million identities for more than 5,000 organizations worldwide.
Privileged Access Management (PAM) solutions are critical cybersecurity controls that address the security risks associated with the use of privileged access in organizations and companies. To reduce the risk of privileged accounts being hijacked or used fraudulently, and to uphold regulatory compliance, a strong PAM solution is essential. But finding the right PAM solution can be challenging.