
Sign up to save your podcasts
Or
Identity and access management (IAM) is a balancing act. On the one hand, organizations need to mature their capabilities as corporate assets increasingly live outside the traditional security perimeter. On the other hand, this can’t come at the cost of complicating the end-user experience. By focusing on five pillars of IAM, organizations can strike a balance, and give the right users the right level of access to enterprise resources at the right time. On the latest episode of World Wide Technology’s TEC37 series on Security, join host Robb Boyd as he speaks with WWT’s Matt Wampler, Principal Security Consultant, and Maafu Shabaz, Principal Consultant. They’ll discuss how organizations can adopt identity principles and practices to drive a cohesive, strategic approach to IAM.
Presenters
Mike Wampler, WWT
Maafu Shabaz, WWT
Robb Boyd, Host
WWT Related Content
Thales Cipher Trust Tokenization Lab
CyberArk Privileged Account Management Lab
RSA Identity Governance and Lifecycle (IGL)
WWT Security Services
Five Considerations for Successful Identity and Access Management Architecture
Identity and Access Management Overview
4.6
1010 ratings
Identity and access management (IAM) is a balancing act. On the one hand, organizations need to mature their capabilities as corporate assets increasingly live outside the traditional security perimeter. On the other hand, this can’t come at the cost of complicating the end-user experience. By focusing on five pillars of IAM, organizations can strike a balance, and give the right users the right level of access to enterprise resources at the right time. On the latest episode of World Wide Technology’s TEC37 series on Security, join host Robb Boyd as he speaks with WWT’s Matt Wampler, Principal Security Consultant, and Maafu Shabaz, Principal Consultant. They’ll discuss how organizations can adopt identity principles and practices to drive a cohesive, strategic approach to IAM.
Presenters
Mike Wampler, WWT
Maafu Shabaz, WWT
Robb Boyd, Host
WWT Related Content
Thales Cipher Trust Tokenization Lab
CyberArk Privileged Account Management Lab
RSA Identity Governance and Lifecycle (IGL)
WWT Security Services
Five Considerations for Successful Identity and Access Management Architecture
Identity and Access Management Overview