How to Make Your IAM Program a Success
- LANGUAGE: English DATE: Thursday, February 22, 2018 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
Identity and Access Management (IAM) is one of the most important and challenging disciplines, involving multiple departments and systems across the enterprise and requiring constant communication between the business and IT. Without IAM, it is difficult to mitigate access risks, to comply with regulations and to deliver a consistent and frictionless user experience.
The best way to ensure the success of your company’s IAM program is to follow in the footsteps of organizations whose programs have proven successful, learn from their leading IAM experts and avoid common mistakes.
KuppingerCole has compiled a list of recommendations and best practices based on a series of interviews with enterprise security architects, IAM leads, CISOs and other executives from a number of large enterprise organizations in different industries across the globe.
Join this webinar and learn how to succeed with IAM; receive recommendations for organizational and process aspects of rolling out a successful IAM program and learn how to make it ready for inevitable future changes.
Here are just a few of the topics that will be discussed:
- Helping your stakeholders understand the business benefits of the program to gain support at the board level and secure the budget;
- Setting the right expectations and planning the available resources to ensure quick wins;
- Planning the IAM organization, establishing communications between departments and third parties;
- Defining compliant, sustainable and efficient IAM processes based on best practices;
- Harnessing the latest IAM developments such as Identity as a Service, Adaptive Authentication, User Behavior Analytics and even Blockchain!
In the first part of the webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will outline the challenges companies are facing when planning their IAM programs and provide detailed recommendations on selecting the right tools, defining proper organizational processes and staying up-to-date with the latest trends in IAM.
In the second part, Martin will be joined by two speakers from customer organizations and a speaker from One Identity who will offer their insights into the organizational and technical details of their successful IAM programs and share their own experiences, tips and recommendations in a panel-like discussion.
Tom Golson, Associate Director of IT Security Operations at the Texas A&M University, will talk about challenges of implementing unified identities across a multitude of systems on the campus.
Wolfgang Zwerch, Corporate Security Architect for Global IAM at Munich Re (Group), will share his experience of running a successful multi-year IAM program for an international company in a highly-regulated industry.
Paul Walker, Technical Director at One Identity, will provide some practical advice for those about to embark on an IAM journey and share experience gathered over 20 years in helping customers achieve their goals.
One Identity, a Quest Software business, helps organizations achieve an identity-centric security strategy with a uniquely broad and integrated portfolio of identity management offerings developed with a cloud-first strategy including AD account lifecycle management, identity governance and administration and privileged access management. One Identity empowers organizations to reach their full potential, unimpeded by security, yet safeguarded against threats without compromise regardless of how they choose to consume the services. One Identity and its approach is trusted by customers worldwide, where more than 7,500 organizations worldwide depend on One Identity solutions to manage more than 125 million identities, enhancing their agility and efficiency while securing access to their systems and data – on-prem, cloud or hybrid. For more information, visit http://www.oneidentity.com.
As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict access control for every user or device protects your organization from advanced security threats enabling you to stay connected, productive and secure.