Date: Wednesday, May 10, 2017 Time: 17:30-18:30
Location: WINTER GARDEN
Identity & Access Management out of the Cloud
Traditional enterprise perimeters are vanishing due to the sourcing of computing resources and applications from heterogeneous multi-cloud environments. Business processes and sensitive business data are leaving the enterprise domain. Meanwhile, new decentralized identity silos are emerging in the Cloud and have to be managed in order to maintain full access governance. Moreover, the proliferation of mobile devices and the need to collaborate on a global scale are challenging existing...
Revealed – Your Access Governance Blind Spot. How to Protect your Organisation from Financial and Reputation Losses
Many organisations that are confident that they have protected themselves from data breaches, have a false sense of security. In fact, they have a dangerous blind spot when it comes to privileged access governance.
Many organisations are managing identity and access for regular users and privileged users in separate silos, blind to the risks of their failure to address privileged access governance (PAG) as part of a unified approach to governance.
Join this session to identify the...
SSH Keys. Trusted Access out of Control
SSH user keys provide access to your most critical infrastructure and applications, both on premise and in the cloud. Unlike other access credentials they are the ONLY form of access that can be self-provisioned without oversight, never expire, & are not clearly linked to identity and governance polices or systems. In this session we will demonstrate for you the challenge enterprises face today and how to gain visibility, control & governance of this unharnessed access.