How to Make Your IAM Program a Success
- LANGUAGE: English DATE: Thursday, February 22, 2018 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
Recommendations From the Field
The best way to ensure the success of your company’s IAM program is to follow in the footsteps of organizations whose programs have proven successful, learn from their leading IAM experts and avoid common mistakes.
KuppingerCole has compiled a list of recommendations and best practices based on a series of interviews with enterprise security architects, IAM leads, CISOs and other executives from a number of large enterprise organizations in different industries across the globe.
Join this webinar and learn how to succeed with IAM; receive recommendations for organizational and process aspects of rolling out a successful IAM program and learn how to make it ready for inevitable future changes.
Here are just a few of the topics that will be discussed:
- Helping your stakeholders understand the business benefits of the program to gain support at the board level and secure the budget;
- Setting the right expectations and planning the available resources to ensure quick wins;
- Planning the IAM organization, establishing communications between departments and third parties;
- Defining compliant, sustainable and efficient IAM processes based on best practices;
- Harnessing the latest IAM developments such as Identity as a Service, Adaptive Authentication, User Behavior Analytics and even Blockchain!
In the first part of the webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will outline the challenges companies are facing when planning their IAM programs and provide detailed recommendations on selecting the right tools, defining proper organizational processes and staying up-to-date with the latest trends in IAM.
In the second part, Martin will be joined by two speakers from customer organizations and a speaker from One Identity who will offer their insights into the organizational and technical details of their successful IAM programs and share their own experiences, tips and recommendations in a panel-like discussion.
Tom Golson, Associate Director of IT Security Operations at the Texas A&M University, will talk about challenges of implementing unified identities across a multitude of systems on the campus.
Wolfgang Zwerch, Corporate Security Architect for Global IAM at Munich Re (Group), will share his experience of running a successful multi-year IAM program for an international company in a highly-regulated industry.
Paul Walker, Technical Director at One Identity, will provide some practical advice for those about to embark on an IAM journey and share experience gathered over 20 years in helping customers achieve their goals.
Fasanenstraße 33 • 10719 Berlin • Germany
One Identity, a Quest Software business, helps organizations get identity and access management (IAM) right. With a unique combination of offerings, including a portfolio of identity governance, access management and privileged management, and identity as a service that helps organizations reach their full potential, unimpeded by security, yet safeguarded against threats.
One Identity is committed to its customers’ long-term IAM success. More than 7,500 customers worldwide depend on One Identity solutions to manage more than 125 million identities, enhancing their agility and efficiency, while securing access to their data -- wherever it might reside.
For more information, visit www.oneidentity.com
The security landscape has changed in the recent decade, and the methods we used to protect our enterprise networks are no longer working. The network perimeter has dissipated, the adversary has become increasingly skilled at alternative methods to gain entry, and enterprise applications and data are spread across multiple environments, on-premises and in the cloud. With more sensitive information getting out of our control every day, a data breach is just waiting to occur, and the consequences, if successful, can be disastrous for your business.
The Consumer Identity World USA is the place where you get input for your perfect CIAM Strategy. Learn more about Privacy by Design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.