Building an Identity-Centric Security Strategy
Facebook Twitter LinkedIn

Building an Identity-Centric Security Strategy

Combined Session
Wednesday, May 11, 2022 14:30—15:30
Location: A03-04

Zero Trust and Software Supply Chain Security: Must-do’s for Every Organization

The risks of an insufficiently secured software supply chain have been known to industry experts for decades, but it took a series of high-profile attacks like Solarwinds or Log4Shell to bring them to the attention of much wider audiences. Now everyone finally seems to realize how catastrophic the consequences of such an attack could be, but still, many organizations are struggling to understand the scope of the security measures that are needed to prevent them from happening.

Alexei Balaganski
Alexei Balaganski
Alexei is an analyst with specific focus on cybersecurity and Artificial Intelligence. At KuppingerCole, he covers a broad range of security-related topics: from database, application and API...

Experience is What Counts, Orchestration is How you Get There

The IAM space has grown immensely, with countless vendors emerging over recent years. Some of these offer a full suite of functions, which can cover many, if not most requirements organisations may have, whereas others offer niche or point solutions focusing on a single function, each with their own way of doing things.

Organisations often find themselves in a situation where they have to adapt their vision to what the products are capable of, sometimes needing to stitch together multiple products from different vendors and bridge the gaps through custom development. This may lead to a solution which is more home-grown than off-the-shelf, something fragile, inflexible, and hard to maintain, quite the opposite of current needs. Making changes to improve the user experience becomes a challenge, switching products or introducing new ones a major undertaking.

An alternative approach is to prioritise experience by focusing on a centralised orchestration conducting product functions so that consumers of identity services are served the right experience. This abstraction enables the flexibility and agility today's world requires, implementing the vision as it was white-boarded, custom tailoring the extraordinary experience(s) everyone is longing for. Changes can be made centrally, new functions and products can be introduced as necessary, all without having to make changes in each web application, mobile application or API.

Experience is what counts, orchestration is how you get there.

Mehmet Yaliman
Mehmet Yaliman
Ping Identity
After studying Bioinformatics, Mehmet found himself as a developer, and shortly thereafter he changed his focus to the Identity space, where has been working for over a decade now, spending time in...

Reinventing the Network with Zero Trust to Stop External Network Attacks

In this talk we will cover:

Philip Griffiths
Philip Griffiths
Philip Griffiths is VP Global Business Development and regularly speaks at events from DevOps to IoT to Cyber Security. Prior to this, he worked for Atos IT Services in various roles working with...


On-Demand Access
Re-live EIC 2022
Watch 200 sessions on-demand
Download all available presentations
Subscribe for updates
Please provide your email address