Identity & Access Governance (IAG) objectives go beyond simple re-certification of user entitlements, and they are involving various stakeholders ranging from business to IT. When dealing with identity data quality issues, risk assessments for resources, threat mitigation or role life-cycle management: Where can automated procedures relieve business officers, and how can responsible stakeholders collaborate in the best way?
The panelists will make their proposals how IAG can be implemented as a really efficient and responsive solution. They will focus on discussing how to combine responsibilities and people’s expertise to make IAG a success.