World Wide Technology - TEC37

44. Security: 5 Pillars of Identity and Access Management


Listen Later

Identity and access management (IAM) is a balancing act. On the one hand, organizations need to mature their capabilities as corporate assets increasingly live outside the traditional security perimeter. On the other hand, this can’t come at the cost of complicating the end-user experience. By focusing on five pillars of IAM, organizations can strike a balance, and give the right users the right level of access to enterprise resources at the right time. On the latest episode of World Wide Technology’s TEC37 series on Security, join host Robb Boyd as he speaks with WWT’s Matt Wampler, Principal Security Consultant, and Maafu Shabaz, Principal Consultant. They’ll discuss how organizations can adopt identity principles and practices to drive a cohesive, strategic approach to IAM.

 

Presenters

 

Mike Wampler, WWT

 

Maafu Shabaz, WWT

 

Robb Boyd, Host

 

WWT Related Content

 

Thales Cipher Trust Tokenization Lab

 

CyberArk Privileged Account Management Lab

 

RSA Identity Governance and Lifecycle (IGL)

 

WWT Security Services

 

Five Considerations for Successful Identity and Access Management Architecture

 

Identity and Access Management Overview

 

...more
View all episodesView all episodes
Download on the App Store

World Wide Technology - TEC37By World Wide Technology

  • 4.6
  • 4.6
  • 4.6
  • 4.6
  • 4.6

4.6

10 ratings