Mastering Identity Access Management

Logo
Presented by

Diana Kelley, SecurityCurve | Devin Krugly, Rapid7 | Aubrey Turner, Ping Identity

About this talk

In 2022, the end-user won’t tolerate a poor experience; when it comes to accessing resources and services remotely, both your workforce and customers have grown accustomed to convenience. And now that we can connect from anywhere on any smart device, secure remote access is more important than ever. For many, Identity Access Management (IAM) is the key to striking the balance between experience and security. IAM places identity at the center of security and enables the right individuals to access the right resources at the right times. And we’re extending our use of IAM with CIAM (customer), PIAM (partner) and identity providers that allow everyone to BYOI (bring your own identity). Gartner estimates that the Identity Access Management market is expected to reach $19 billion in 2024. Join us in this episode of The (Security) Balancing Act as security experts discuss: - Key considerations when developing a strategy for an IAM framework, particularly how to integrate the next-generation solutions and technology into existing infrastructures - What constitutes a strong and effective IAM program, and how to balance experience with security Implications of CIAM, PIAM, and BYOI adoption The importance of that “first step” - identity verification in a distributed world - How does IAM align with zero-trust security? - The differences between authentication and authorization - What are the challenges that can hinder a successful IAM implementation?
Related topics:

More from this channel

Upcoming talks (9)
On-demand talks (51)
Subscribers (23661)
As we realize the transformative power of the cloud, AI and machine learning, has our culture of responsibility and ethics kept pace? How do we harness our new technological capabilities to the understanding of how to use them well?