Event Recording

Morey J. Haber: 10 Steps to Universal Privilege Management

Show description
Speaker
Morey J. Haber
Chief Security Officer
BeyondTrust
Morey J. Haber
Morey J. Haber is the Chief Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored four books: Cloud Attack Vectors, Privileged Attack Vectors, Asset Attack Vectors, and Identity Attack Vectors. He is a founding member of the industry group...
View profile
Playlist
Enterprise Identity Success
Event Recording
Matthias Reinwarth: The Three Fundamentals of Enterprise Identity Success - My Take
Sep 08, 2020
Event Recording
Mike Kiser: 13 Treasures in 81 Minutes: The Isabella Stewart Gardner Heist and Identity as the New Vermeer
Sep 08, 2020

In the early hours of March 18th, 1990, two men entered the Gardner Museum. They left 81 minutes later with 13 artworks, including two Rembrandts, a Vermeer, a Degas, and ancient Chinese vase.  The heist remains unsolved today, with no leads and no suspects — and the museum is offering a $10 million prize for the safe return of the pieces.

Given that background, you might assume that this was another session about zero trust. It’s not.

Recently, a growing emphasis on data privacy has sought to treat identities and their associated data as valuable works of art as well, worthy of protection and compensation for use. Through the lens of the Gardner Theft, we’ll evaluate the current proposals and concepts around user-owned data and explore the benefits and pitfalls of each.

We'll step through the heist, recreate those 81 minutes, and discover how identity data is the new Vermeer. Note: If we somehow crack the case together, we'll split the $10 million between us all.

Event Recording
Loren Russon: Good Enough is Never Enough When Protecting Your Business Resources & Customer’s Data
Sep 08, 2020

Technology is evolving quickly and keeping pace requires deep knowledge and experience. Enterprises are also evolving quickly and demand advanced but simple identity solutions to successfully fast track digital transformation, cloud adoption and Zero Trust initiatives. By utilizing “Best of Breed” solutions, organizations can take advantage of the key benefits that only a multi-vendor solution can offer. Join this session to learn about the core principle of best of breed solutions and hear about some examples of what organizations have done to build the right foundation for Enterprise Identity Success.

Event Recording
Henk Marsman: Moving From the Dark Age of Legacy to the Era of Enlightenment
Sep 08, 2020

In this presentation Henk will share the journey that Rabobank made from a situation in 2017 with two solutions and infrastructural environments for IAM and two teams, that merged and went on a journey to become one, as well as overcoming the legacy environments that delivered the service. The presentation details especially the management of this journey and how to move from A to B to C to D to Enlightenment. And perhaps we're not even there yet.

The presentation will detail our specific journey, but general key takeaways can be identified that apply to any IAM department and service.

Event Recording
Neeme Vool: Implementing IAM in the Enterprise: 3 Takeaway Gems from Engineer
Sep 08, 2020

IAM implementations are not all same, but for sure there is not as many implementations as there are situations.I have selected 3 major factors which defined our IAM project. Of course, final result was a consequence of lot more things.

And yes, we succeeded to implement full Identity lifecycle in the enterprise where starting point is a complex matrix of requirements like multiple legal entities, multiple contracts, kinds of work relationships, several account directories, manual processes.

Just name any situation, we had it. We were on the edge of failure and almost ready to add yet another failed IAM project to the list. But we made it and if I had to do it yet again in another place, in another situation, I would take these 3 with me.

Takeaways:

-Correct data is vital for every IT project, IAM is not special. But where to exactly look in the IAM project? Which issues with the data are toxic?

-The analysis of the system drives implementation architecture and design. Thereby the steering must be correct.

-And finally, how to bring it out in the enterprise scale if you cannot do big bang but same time you cannot left anybody behind?

Event Recording
Vickus Meyer: Nedbank Identity & Access Governance Fundamentals in Action
Sep 08, 2020