Assessing, Simplifying, and Integrating IAM
Ransomware, data breaches, and password leaks are dominating the headlines in 2016. In 2015 there were more than 169 million records exposed in 1,400 data breaches. An astonishing 43% of those breaches were caused by people within the breached organizations.
The identities in your organization – the employees, contractors, suppliers, vendors, partners, and even customers – are who access your data. Securing those identities is everything, and governing them must be at the center of your IT security strategy. Unlike other areas of security where the focus is about keeping threats from outside in check, Identity and Access Management (IAM) focuses on account and permissions weakness across both inside and outside the organization.
IAM deployments can be complicated, involving people, processes, and technology across the entire business. Phil Cook, Director of IAM Services, CBI, hosts a short webinar workshop. Phil will share his 15 plus years’ experience working in IAM. Join this event to get answers and expert insight into key topics like:
- What Is and Isn’t IAM
- IAM Assessments and Roadmaps
- Challenges in IAM Deployments
- Poor Business Processes
- Bad Source Data
- Inconsistent User Lifecycles
- Lack of Full Organizational Support
- Why Do It
- How to Start
- Avoiding Pitfalls