Redefining Access Governance
- TYPE: Track START DATE: Thursday, May 07, 2015 START TIME: 11:00 LOCATION: AMMERSEE I
Moderator(s):
Access Governance and its requirements are currently changing just as much as Identity and Access Management are. With the availability of newly designed, complementary technologies for the collection and analysis of real time access data as well as real time data analytics, current Access Governance and Access Intelligence architectures offer the opportunity of being transformed into a strategic component for corporate governance and proactive security management on top of a well-established existing Identity and Access Management system which includes the associated identity provisioning tools.
To redefine Access Governance it is required to first take a step back, to identify strengths and weaknesses of current Access Governance solutions and reconsider the underlying concepts.
Understanding the upcoming challenges for Identity and Access Management, and thus for Access Governance as well, forms the second part. These challenges for Access Governance include the need to embrace the extended enterprise, the context of Dynamic Authorization Management, and the extension of Access Management towards Entitlement Access Governance.
Third and finally, Access Analytics and Access Intelligence supplement Access Governance by additionally accessing both real time and historic activity data to enable automated and ad-hoc evaluation of policy-based rules and pattern-based activity monitoring.
The resulting approaches and suggestions range from slight amendments to the process design and implementation (e.g. dynamic recertification schedules) over role attribute changes (by adding access risk information to entitlements) to extending existing architectures by adding powerful real time Access Analytics and Access Intelligence functionalities and bridging the gaps to interact with traditional GRC infrastructures and Real Time Security Intelligence.
After attending this block of sessions you will be able to
- List the strengths and weaknesses of current Access Governance solutions
- Describe the challenges faced by Identity Management, Access Management and Access Governance
- Understand and describe the role of Access Intellignece and Automation in modern IAM environments
- Define alternaive approaches to traditional access recertification campaigns
This block qualifies for up to 5 Group Learning based CPEs depending on the number of sessions you attended.
Sessions:
One-Click Insight, Lean Recertification, Improved Compliance: Redefining Access Governance for the Digital Business
Roles or no Roles, that’s the Question. Two Different Approaches for Compliant IAM Processes.
European Identity & Cloud Conference 2015
- Language:
- English
- Registration fee:
-
€1980.00
$2475.00
S$3168.00
21780.00 kr
INVOICE
- Contact person:
-
Mr. Levent Kara
lk@kuppingercole.com
- May 05 - 08, 2015 Munich, Germany