World Wide Technology - Tec37

44. Security: 5 Pillars of Identity and Access Management

Informações:

Sinopsis

Identity and access management (IAM) is a balancing act. On the one hand, organizations need to mature their capabilities as corporate assets increasingly live outside the traditional security perimeter. On the other hand, this can’t come at the cost of complicating the end-user experience. By focusing on five pillars of IAM, organizations can strike a balance, and give the right users the right level of access to enterprise resources at the right time. On the latest episode of World Wide Technology’s TEC37 series on Security, join host Robb Boyd as he speaks with WWT’s Matt Wampler, Principal Security Consultant, and Maafu Shabaz, Principal Consultant. They’ll discuss how organizations can adopt identity principles and practices to drive a cohesive, strategic approach to IAM.   Presenters   Mike Wampler, WWT   Maafu Shabaz, WWT   Robb Boyd, Host   WWT Related Content   Thales Cipher Trust Tokenization Lab   CyberArk Privileged Account Management Lab   RSA Identity Governance and Lifecycle (IGL)   WWT Securi