Darran Rolls: IGA Under Fire? Requirements and Essential Best Practices for Protecting the Keys to your Kingdom

In order to watch this video, you have to log in or create an account, if you don't have one yet.
This video is only available to registered participants of the event.

Recent forensic evidence shows that IAM solutions and infrastructure are a strategic attack vector.  In today’s complex and highly distributed enterprise security supply chain, are you adequately protecting the identity and access administration capabilities at the center of your security architecture?  

In this session, former CTO and CISO Darran Rolls will provide a unique perspective on the critical steps required to secure your Identity Governance and Administration infrastructure.  Whether you employ on-prem or SaaS technology to meet your provisioning and governance needs, this session will highlight the obligations and best practices for securing your processes and your infrastructure.  IGA holds the keys to your kingdom – do you know who has access to it?

Language: English • Duration: 21:10 • Resolution: 1280x720

Learn more about this virtual event

Latest Related Videos

Stay Connected

KuppingerCole on social media

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00