B2B IAM: A Gap Between Modern Demands and Current Practices
Facebook Twitter LinkedIn

B2B IAM: A Gap Between Modern Demands and Current Practices

Combined Session
Friday, May 12, 2023 11:30—12:30
Location: A 05-06

B2B IAM: A Gap Between Modern Demands and Current Practices

Most enterprises nowadays need to grant access to multiple business partners daily as they heavily rely on online interactions (online relationships) with one another. 

Thus, an ever-expanding, interconnected digital ecosystem emerges, the complexities of which frequently result in operational inefficiencies, security risks, increased administrative costs, and unintuitive user experiences. 

These challenges are long lived in the B2B identity management space. Yet still today, many organisations continue to struggle using outdated, homegrown and oftentimes error prone centralised IAM systems.  

This session will unwrap modern, decentralised solution trends in the fast-growing segment of IAM using real-life use cases. It will also explore best practices for digital access and delegation management for business partners - seamlessly and securely at scale. 

 

B2B IAM: A Gap Between Modern Demands and Current Practices
Event Recording
B2B IAM: A Gap Between Modern Demands and Current Practices
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
B2B IAM: A Gap Between Modern Demands and Current Practices
Presentation deck
B2B IAM: A Gap Between Modern Demands and Current Practices
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Marco Venuti
Marco Venuti
Thales
Marco Venuti is IAM Enablement and Acceleration Director at Thales Group. Marco has 20+ years of direct experience in Identity & Security, having worked for multiple solution vendors in Sales...

Holistic SAP Governance through Enterprise Environment Integration

Vertical risk management and complete identity governance can only be achieved through integration of critical platforms with other systems and applications in use and by either integrating existing point-solutions or reducing their number altogether. Integration of the identity-platform with SAP is one of those major challenges for many organizations today.

One Identity’s approach to this challenge is through a unifying, standard integration into SAP as well as other systems and applications to establish a common GRC framework and security concept. Which includes preventing isolated environments. To establish SAP-internal governance and minimize risk within the platforms privilege landscape most organizations use specialized embedded tools like ECS (Easy Content Solution) from IBS-Schreiber Solution. Integrating the identity management platform with the SAP rule-set administration allows SAP Rule sets to be applied directly, run SoD-analysis fast and efficiently and extend them to other systems and applications, such as MS AD, AAD. The potential value of this approach is significant as it allows a preventive risk-assessment throughout the whole SAP-stack.

This integrative approach also extends to the SAP Firefighter concept for it to be applied to the rulesets and extend these into other systems. The objective is clear: Simplify risk assessment and management, establish a unified identity administration framework and as baseline - reduce cost.

In short – it lays the foundation and framework for solid Governance.

Holistic SAP Governance through Enterprise Environment Integration
Event Recording
Holistic SAP Governance through Enterprise Environment Integration
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Holistic SAP Governance through Enterprise Environment Integration
Presentation deck
Holistic SAP Governance through Enterprise Environment Integration
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Reto Bachmann
Reto Bachmann
One Identity
Reto Bachmann is Technical Regional Manager Austria, Switzerland and Middle East at One Identity. Reto Bachmann has over 25 years of experience in IT, and over 15 years in IAM and cyber security....

How to Manage Complex Clouds Based on Cyber Resistance

You have probably heard about Cyber Resilience, and how about Cyber Resistance? What should be the differences between the two terms in the context of Cybersecurity? Cyber Resistance is the same or not?

Prioritizing where to focus efforts first when attack scenarios are almost endless is a complex task. There are often millions of potential attack paths. Most organizations do not know what those paths are or how to prioritize which ones to close first if they can be closed at all.

During this presentation, we will be understanding the differences between Cyber Resistance and Cyber resilience, and how we can apply both concepts to our current technology landscape, besides understanding how we can identify the High-Value Target (HVT) in your organization.

How to Manage Complex Clouds Based on Cyber Resistance
Event Recording
How to Manage Complex Clouds Based on Cyber Resistance
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
How to Manage Complex Clouds Based on Cyber Resistance
Presentation deck
How to Manage Complex Clouds Based on Cyber Resistance
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Filipi Pires
Filipi Pires
senhasegura
I’ve been working as Security and Threat Researcher and Cybersecurity Advocate at senhasegura, Founder at Black&White Technology, Snyk Ambassador, Application Security Specialist and...
Subscribe for updates
Please provide your email address