Full-Stack OAuth Security • Privilege Management and IAM Considerations in Hybrid Environments • The Future of Cybersecurity: Giving your business Leadership the Confidence of Control
by Pamela Dingle, Barry Scott, Suresh Sridharan
The OAuth 2.0 stack has matured but it involves a whole bunch of IETF RFCs. Join Pamela Dingle in a run through of the actual protocols involved in creating an OAuth identity ecosystem that might meet PSD2, Open Banking or high-assurance corporate standards. The goal will to be to see the big picture of how all the bits combine to make a working ecosystem. As traditional definitions of privileged and end users become blurred, privileged identity management extends to much more than managing on-premises and ...
IaaS Cloud Services for the Paranoid • Privilege Management @ BASF
by Dr. Ravindar Bindra, Christian Schwenk
Many companies today are purchasing IaaS as an extension or replacement of their internal data centers and the Infrastructure team is given the task of offering the internal customers a PaaS for their hosted applications. The question of how to secure the data remains uppermost in the minds of CISOs and now even CIOs. For the security professional - it gives a green field in which to architect the utopia of The Perfect Design. When coupled with Operational reality, a more realistic, scalable and simple ...
Securing Elevated Privileges: Integrating Access Governance and Privilege Management • Early Check-in with Identity and Access Governance Best Practices
by Martin Kuppinger, Dr. Horst Walther, Erich Vogel, Idita Israeli Sabag
Why these two areas can’t be handled separately. How to set up guidelines, processes, and organization to manage privileged accounts through their whole life cycle. How to integrate technically.
Role-based Privileges Management - Using Analytics to Quickly Deliver Meaningful Results • Top-down or Bottom-up Roles Modeling: Which Approach fits best?
by Prof. Dr. Dr. Gerd Rossa, Oliver Belikan, Dr. Ron Rymon, Dr. Martin Kuhlmann, Paul Heiden, Rüdiger Berndt, Brent Thurell
Based on the experience of the past few years, Role-based Access Control (RBAC) has emerged as best practice in the management of enterprise privileges, with the major drivers being Identity Management projects and regulatory compliance requirements. Eurekify presents an RBAC implementation approach that is based on pattern-recognition analytics, and has been shown to enable much faster implementation and significant immediate and ongoing benefits to the organization. We will discuss this approach compared ...