Darran Rolls: IGA Under Fire? Requirements and Essential Best Practices for Protecting the Keys to your Kingdom

In order to watch this video, you have to log in or create an account, if you don't have one yet.
This video is only available to registered participants of the event.


Recent forensic evidence shows that IAM solutions and infrastructure are a strategic attack vector.  In today’s complex and highly distributed enterprise security supply chain, are you adequately protecting the identity and access administration capabilities at the center of your security architecture?  

In this session, former CTO and CISO Darran Rolls will provide a unique perspective on the critical steps required to secure your Identity Governance and Administration infrastructure.  Whether you employ on-prem or SaaS technology to meet your provisioning and governance needs, this session will highlight the obligations and best practices for securing your processes and your infrastructure.  IGA holds the keys to your kingdom – do you know who has access to it?

Language: English • Duration: 21:10 • Resolution: 1280x720

Learn more about this virtual event

Latest Related Videos


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Stay Connected

KuppingerCole on social media

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00

Other videos