Modernizing IGA Systems
Facebook Twitter LinkedIn

Modernizing IGA Systems

Combined Session
Wednesday, September 15, 2021 14:30—15:30
Location: ALPSEE

From Day One to Hour One: IGA in the Era of Extreme Automation

Cloud capabilities are driving automation approaches that will upend traditional, linear templates for Identity Governance service delivery. This extends to everything from application/service on-boarding, provisioning and user lifecycle management workflows. In this session, Manoj will share his experience of working on automation approaches for cloud workloads and discuss what this means for the future of IGA in the era of continuous integration and delivery.

Suganya Balan
Suganya Balan
Philip Morris International
Suganya Balan is the Product Owner for the Privileged Access Management Service at Philip Morris International. Also responsible for delivering digitalisation of IGA in the organizations’...
Manoj Kumar
Manoj Kumar
Philip Morris International
Manoj is a thought and practice leader in the Identity and Access Management (IAM) space. As a security professional, Manoj not only has hands-on experience in consulting with clients on their IAM...

Panel: A First-Person Account of Third-Party Identity Risk Management

In a 2018 study by Onus & Ponemon on data risk in the third-party ecosystem, more than 75% of companies surveyed said they believe third-party cybersecurity incidents are increasing. Those companies were right to believe that.

As our world becomes more digitized, and thus more interconnected, it becomes increasingly more difficult to safeguard organizations from cybercrime. Tack on to that challenge a global pandemic that all but forced organizations to become “perimeter-less,” if they weren’t already, and the potential access points for bad actors through third-party access increases exponentially.

The problem is two-fold.

The landscape of third-party users is vast and continues to grow. From third-party non-employees like vendors, contractors and affiliates to non-human third parties like IoT devices, service accounts and bots, more organizations are engaging third parties to assist with their business operations and help them to innovate, grow faster, improve profitability, and ultimately create greater customer value – faster. On average, companies share confidential and sensitive information with more than 580 third parties and in many cases, an organization's third-party workers can actually outnumber their regular, full-time workforce.

Yet, despite the increased use of third-party workers in business, most organizations lack the proper third-party risk culture, processes, and technologies to protect themselves against the long list of third parties with access to their sensitive data and systems. Organizations have these systems in place to manage their full-time employees but lack the same level of rigor to manage these higher-risk third-parties. As a result, many third-party users are provided with more access than needed for their roles, and most disturbingly, that access is frequently not terminated when the third party no longer needs it.

Without the right third-party identity lifecycle management procedures in place, businesses unwittingly expand their attack surface, unnecessarily put sensitive information at risk, and create additional access points for hackers.

As a panelist, David Pignolet, founder and CEO of SecZetta, can bring an expert third-party identity risk perspective to a range of fast-evolving security topics, including:

Zero Trust: Without an authoritative source of information for third-party workers, Zero Trust programs cannot be implemented across an organization's entire workforce.
Artificial Intelligence: Bots (both chatbots and transactional bots) are third-party non-employee identities that use AI to replicate human behaviors and can be found on websites, messaging applications and mobile apps. If not properly managed and monitored, cybercriminals can turn bots into “evil bots” and use them as a springboard to scan a network for security vulnerabilities that can be exploited at a later date.

Identity Governance and Administration: The identity governance of third-party users is far more chaotic and less linear than that of regular employees. Enterprises often lack formal procurement vetting and identity management processes for third parties, and responsibilities are often distributed across lines of business, Legal, HR, Compliance, and Information Security. A third-party relationship needs to be managed by resources within (sponsors) and outside (delegates) the organization. Current disconnects in this process and lack of transparency into third-party identities often heighten risks including over-provisioned and orphaned accounts.

Cyber Supply Chain Risk Management: Organizations that rely on a robust supply chain sector can have upwards of 2-3 supply chain workers for every one employee, but like with most other industries, these organizations often lack the proper onboarding systems and processes for their supply chain workers. To mitigate the risks third parties present in their supply chains, manufacturers must improve the granularity, transparency, consistency, and agility of their third-party risk management effort. In particular, manufacturers can’t overlook the safety and IP protection concerns related to granting third parties access to facilities.

Privileged Access Management: Organizations grant their employees certain security privileges and access based on their roles and typically have well documented processes for revoking those privileges upon termination of employment. However, too many organizations lack the protocols and processes for revoking privileges and access to non-employee workers once their jobs are complete, leaving an organization vulnerable to cybercriminals who can gain access through unauthorized access privileges.

Session participants will learn the many ways in which increased digitization in workforces has expanded the cyber attack surfaces for organizations lacking proper third-party identity risk cultures.

Session participants will return to their organizations with a clear and thorough understanding of the third-party identity risks that might be threatening their business and how to mitigate that risk.

Session participants will understand how to apply the proper third-party identity risk culture to their organization’s work to minimize their potential cyber attack surface, including specific best practices they can immediately put in place.

Dr. Martin Kuhlmann
Dr. Martin Kuhlmann
Omada
Dr. Martin Kuhlmann heads up the Global Presales Team at Omada. In this position and formerly as Senior Solution Architect, he has been advising strategic customers and designing Identity &...
David Pignolet
David Pignolet
SecZetta
With nearly two decades of experience in application, network, and data security, David Pignolet founded SecZetta in 2006, assembling a highly-experienced team and securing strategic partnerships...
Fabian Süß
Fabian Süß
KuppingerCole
Fabian joined KuppingerCole‘s Events Team in July 2021 as a Project Manager, with a focus in Content and Agenda for the Cybersecurity Leadership Summit. He holds both a M. Eng. in...

WHY ON PREMISE IGA IS THE NEW LEGACY

In this session Thomas Müller-Martin, Global Technical Lead at Omada will share his insights about the evolving IGA market and why companies today choose an enterprise IGA SAAS platform over an on-premise solution. Learn in this session how to transform your legacy or home-grown solution to a modern IGA solution without the hassle of long and cumbersome implementation and high maintenance costs. Based on best practices, we will demonstrate to you how organizations today can deliver fast value to their business to mitigate risk and increase efficiency. Join this interesting speech by Omada, a global market leader in Identity Governance and Administration (IGA).

Thomas Müller-Martin
Thomas Müller-Martin
Omada
An Identity Management enthusiast, Thomas Müller-Martin has more than 15 years of experience in the Identity & Access Management field. Throughout his career he has contributed to...

Tickets

On-Demand Access
Re-live EIC 2021
€100
 
Watch more than 250 sessions on-demand
Download all available presentations
Subscribe for updates
Please provide your email address