Briefings Part 2: Who's accessing your critical data, and what are they doing?
Presented by
Neil Warburton, Security Architect, IBM Security Systems
About this talk
Beyond Traditional Defences
Recent security breaches by trusted insiders have propelled Identity and Access Management (IAM) to the top security priority of many organisations.. After all, it’s clear security is only as strong as its weakest link – people – and the press is full of articles documenting the damage people can do. So it’s natural for security managers to want to shore up their IAM infrastructure to avoid similar embarrassment.
Some are finding it difficult to understand who has access to their critical data and whether they are using it appropriately. Understanding the full extended environment and by taking associated risks into account is the way to avoid being in the headlines. In other words, whether you are starting from scratch or taking on new IAM challenges such as cloud and mobile, there are certain principles you should follow to build a successful, effective IAM solution.
Join Neil Warburton, Security Architect at IBM and learn about the key principles that will help you implement a successful IAM solution. The session will be moderated by John Colley, Managing Director at (ISC)2 EMEA.
(ISC)² Security Briefings EMEA offers members in Europe, the Middle East and Africa a chance to learn about the latest trends, tools and best practices in cyber, information, software and infrastructure security while earning CPEs…