How to Make Your IAM Program a Success

  • LANGUAGE: English DATE: Thursday, February 22, 2018 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
Upcoming Webinars
How to Make Your IAM Program a Success Recommendations From the Field

Identity and Access Management (IAM) is one of the most important and challenging disciplines, involving multiple departments and systems across the enterprise and requiring constant communication between the business and IT. Without IAM, it is difficult to mitigate access risks, to comply with regulations and to deliver a consistent and frictionless user experience.

The best way to ensure the success of your company’s IAM program is to follow in the footsteps of organizations whose programs have proven successful, learn from their leading IAM experts and avoid common mistakes.

KuppingerCole has compiled a list of recommendations and best practices based on a series of interviews with enterprise security architects, IAM leads, CISOs and other executives from a number of large enterprise organizations in different industries across the globe.

Join this webinar and learn how to succeed with IAM; receive recommendations for organizational and process aspects of rolling out a successful IAM program and learn how to make it ready for inevitable future changes.

Here are just a few of the topics that will be discussed:

  • Helping your stakeholders understand the business benefits of the program to gain support at the board level and secure the budget;
  • Setting the right expectations and planning the available resources to ensure quick wins;
  • Planning the IAM organization, establishing communications between departments and third parties;
  • Defining compliant, sustainable and efficient IAM processes based on best practices;
  • Harnessing the latest IAM developments such as Identity as a Service, Adaptive Authentication, User Behavior Analytics and even Blockchain!

In the first part of the webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will outline the challenges companies are facing when planning their IAM programs and provide detailed recommendations on selecting the right tools, defining proper organizational processes and staying up-to-date with the latest trends in IAM.

In the second part, Martin will be joined by two speakers from customer organizations and a speaker from One Identity who will offer their insights into the organizational and technical details of their successful IAM programs and share their own experiences, tips and recommendations in a panel-like discussion.

Tom Golson, Associate Director of IT Security Operations at the Texas A&M University, will talk about challenges of implementing unified identities across a multitude of systems on the campus.

Wolfgang Zwerch, Corporate Security Architect for Global IAM at Munich Re (Group), will share his experience of running a successful multi-year IAM program for an international company in a highly-regulated industry.

Paul Walker, Technical Director at One Identity, will provide some practical advice for those about to embark on an IAM journey and share experience gathered over 20 years in helping customers achieve their goals.


Speakers

Paul Walker is a subject matter expert specialising in the field of IAM for over 20 years. After graduating with a BSc in Computer Science in 1995 he has worked solely in the world of software security and working with IAM since 2001.Paul has held global consulting, sales and product management...

Wolfgang Zwerch was born 1971 and studied computer science at the university of applied science in Augsburg. He has experience in different areas of IT for more than 18 years. Before joining Munich Re he worked for CSC as an IT Security and Identity Management leading consultant for nearly 10...


Lead Sponsor

One Identity provides identity-centric cybersecurity that protects the people, applications and data essential to business. We verify everything, so that each user has the right access, at the right time, for the right reason. Our Unified Identity-Centric Security Platform brings together best-in-class Privileged Access Management (PAM), Identity Governance and Administration (IGA), and Active Directory Management and Security (ADMS) capabilities to mitigate cybersecurity exposure. One Identity is trusted and proven on a global scale – managing more than 250 million identities for more than 5,000 organizations worldwide.

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

Understanding the Privileged Access Management (PAM) Market

Privileged Access Management (PAM) solutions are critical cybersecurity controls that address the security risks associated with the use of privileged access in organizations and companies. To reduce the risk of privileged accounts being hijacked or used fraudulently, and to uphold regulatory compliance, a strong PAM solution is essential. But finding the right PAM solution can be challenging.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00