Hybrid Identity: Bridging Your Identity to the Cloud, Securely & Confidently

Presented by

Scott Villinski, National Director, State and Local Government Enterprise Mobility Sales

About this talk

One of the biggest challenges you will face as you move to the cloud is keeping your users productive while protecting your agency data. Your users' identities will live in your datacenter as well as in the cloud, so how you protect that and maintain your security processes is vitally important. The way people access applications and resources is changing. This is why the user's identity is crucial to protecting your data and applications. Our discussion of hybrid identity will cover: 1. Options for synchronizing identities to the cloud 2. Self-service capabilities for your users, including password management, group management and single sign-on 3. How to configure single sign-on to SaaS applications 4. Automating identity management across different repositories in your datacenter

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (657)
Subscribers (13396)
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security. Due to our partnerships, we are able to offer discounts on some of the most popular security certifications and training courses, including CEH, CISSP, CCISO, and more. www.infosec-careers.com This BrightTALK channel is an extension of the group and the ISCN website (www.infosec-careers.com), featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after. Key areas: InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more