Remote Work and IAM – A Unique Opportunity for Security Leaders

  • LANGUAGE: English DATE: Thursday, July 23, 2020 TIME: 3:00pm CEST, 9:00am EDT
Upcoming Webinars
Remote Work and IAM – A Unique Opportunity for Security Leaders

Nowadays, Identity and Access Management (IAM) is undeniably the first line of defense for organizations worldwide. It enables employees to securely access applications while enhancing control and transparency. But IAM is also on the change. It is already more than just the traditional employee IAM. Digital business requires advanced identity services, well beyond the human identities.

Organizations need to think of many more types of identities, including partners, externals, but also of customers, consumers, devices or non-personalized identities. 

IAM as a necessity for security implementation

The segregation between various dimensions of IAM is blurring. IAM today treads the line between providing security and acting as a business enabler. It has left behind the notion of being "just IT" and turned into a necessity for implementing security and policy and a facilitator of modern business models.

But how can security leaders turn the challenges, both legacy and new, into opportunities to mitigate risk and add value to the business? And all this in a way that will elevate the position, and change the perception, of security at the same time?

This webinar looks at:

  • IAM as a necessary security infrastructure and enabler of new services, models and forms of cooperation
  • The services offered in a modern IAM system, from modern authentication and authorization to audit, governance and compliance.  
  • The access of all identities to potentially all connected systems and infrastructures on premises, in hybrid or multi-cloud environments. 
  • How to understand and learn to communicate single sign-on, password management and adaptive authentication in a business context to position security as a business enabler.

To start off with Matthias Reinwarth, Director Practice IAM at KuppingerCole Analysts will explain why it is essential that the business benefits of IAM are clearly explained when justifying investments. These include the hard to quantify elements such as business flexibility, better service, improved compliance and cyber defense.

In the second part, Barry McMahon from LastPass looks at the challenges security teams are facing based on a recent study. He will detail five drivers where Identity and Access Management can support the business needs to benefit both the business and security team. He will provide guidance on how best to engage the senior decision makers and speak in a language they understand.


Barry is Senior Manager, IAM at LogMeIn where he internally and externally evangelises LastPass and Central. Helping the business grow globally is one of his key responsibilities which involves working with stakeholders across the business to define and refine our growth strategy. One element of...

Lead Sponsor

For more than 70,000 businesses of all sizes, LastPass by LogMeIn reduces friction for employees while increasing control and visibility for IT with an access solution that’s easy to manage and effortless to use. From single sign-on and password management to adaptive authentication, LastPass gives superior control to IT and frictionless access to users. For more information, visit

LogMeIn, Inc. simplifies how people connect with each other and the world around them to drive meaningful interactions, deepen relationships, and create better outcomes for individuals and businesses. One of the world’s top 10 public SaaS companies, and a market leader in unified communications and collaboration, identity and access, and customer engagement and support solutions, LogMeIn has millions of customers spanning virtually every country across the globe. LogMeIn is headquartered in Boston with additional locations in Germany, UK, Ireland, Hungary, Australia, India.

Watch now


Trending Videos

Next Webinar


Managing Cyber Risk in a Hybrid Multi-Cloud IT Environment

Today’s IT environments blend applications and services from multiple public cloud networks, private clouds and on-prem networks, making it difficult to view and inventory assets deployed across complex hybrid networks, and keep track of the security risks. Organizations need to find a way to improve visibility, identify and prioritize risks, and maintain cyber resiliency.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00