InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Playing The Hand You're Dealt in Access Management

Presented by

Wendy Nather, Senior Research Initiatives Director, 1Password

About this talk

When it comes to authentication and access management, there is no one-size-fits-all solution. Organizations face diverse environments, technologies and user needs that shape the way access policies should be constructed and implemented. You might have a set of great policy options at your disposal, but the environment you're in may limit your ability to play the best cards at the right time. In this session on 15 April at 1:00 p.m. BST, join ISC2 and 1Password as we explore various approaches to selecting and configuring access management policies, focusing on pre-login and mid-session controls. We’ll also delve into the complexities of managing exceptions, handling edge cases, and providing a seamless user experience. Most importantly, we’ll discuss best practices for enforcing security policies effectively without causing frustration or confusion for your users. By the end of this session, you’ll have a clearer understanding of how to craft and enforce policies that address the unique challenges your organization faces. Key Takeaways: * Learn how different stages of the user journey require tailored security measures and how to strike the right balance between usability and security. * Navigating Exceptions: Discover strategies for handling exceptions to your policies and ensuring these don’t create unnecessary risk or confusion. * User-Centered Policy Enforcement: Gain insights on how to enforce access policies in a way that is not only secure but also user-friendly, minimizing disruption to end-users. * Adapting to Your Environment: Understand the importance of tailoring policies to fit the specific needs and constraints of your environment, such as legacy systems, cloud integrations or multi-platform requirements. * Real-World Scenarios and Best Practices: Learn from practical examples of challenges faced by organizations and how they successfully implemented flexible and effective access management strategies.
ISC2 Security Briefings - EMEA

ISC2 Security Briefings - EMEA

118136 subscribers437 talks
ISC2 Security Briefings - EMEA
ISC2 Security Briefings EMEA offers members in Europe, the Middle East and Africa a chance to learn about the latest trends, tools and best practices in cyber, information, software and infrastructure security while earning CPEs
Related topics