Enhanced Identity and Access Management

From consolidating directories to automating provisioning and rolling out single sign-on, these sessions identify how leading organizations are strengthening authorization and enforcing access controls.

Compliance may have driven many identity and access management projects but long-term cost savings has proven to be a significant benefit too. From consolidating directories to automating provisioning and rolling out single sign-on, these sessions identify how leading organizations are strengthening authorization and enforcing access controls.

Sessions available for download (click title to download slides) include:

Making the Business Case for Strong Authentication
Speaker: Michael Cobb, founder and managing director, Cobweb Applications, Ltd
This session shows you how the proper classification of data is key to choosing the appropriate level of authentication before profiling various forms of authentication - hardware and software tokens, multiple passwords, smart cards, certificates and biometrics - with an eye toward cost, ease of implementation and security. You also learn how authentication plays into an effective compliance program, understanding the prescriptive steps to take to meet regulatory demands.
For more information: Attend Authentication lesson from SearchSecurity.com's Identity and Access Management School.

Identity Management for the Masses
Speaker:Mark Diodati, analyst, The Burton Group
Frequently, technologies and processes are at the center of our identity management considerations, while the user experience is at the edge. This session, investigates ways to improve the end user's experience, avoid deployment obstacles, and improve security.
For more information: Attend SearchSecurity.com's Identity and Access Management School.

Solving Identity Crises: A Citizens Financial Group Case Study
Speaker: David J. Sherry, VP of enterprise information security, Citizens Financial Group.
This session examines how Citizens Financial Group took a phased approach to its access control rollout. Sherry reveals the implementation, critical items to consider, the need for enterprise framework and governance, and both positive and negative lessons-learned from the project.
For more information: Attend Building an identity and access management architecture from SearchSecurity.com's Identity and Access Management School.

Smart Shopper: IAM products
Speaker: Richard E. Mackey, principal, SystemExperts, ISACA/CISM
One of the most difficult challenges organizations face is managing the identities of employees, customers, partners, and services. Companies invariably find themselves burdened with managing identities from many different internal and external organizations and controlling access to resources these identities use. Historically, companies haven't been motivated to find a centralized solution to this problem. However, with the increased requirements of regulatory compliance like SOX, HIPAA, and GLBA, many organizations have recognized that centralized management of identity and access control is critical to their everyday operations. This session looks at the capabilities of IAM systems and how organizations are using them to meet their requirements.
For more information: Attend the lesson Integrating security into the network from SearchSecurity.com's Identity and Access Management School.


Go to the full listing of sessions
Go to Track 1:Proven Tactics to Repel Emerging Threats
Go to Track 3: Achieving Compliance: A Real-World Roadmap
Go to Track 4: Snyder on Security: An Insider's Guide to the Essentials

This was first published in October 2006

Dig deeper on Enterprise User Provisioning Tools

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close