InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Shifting your IAM Program from Compliance-Driven to Security-Driven

Presented by

Zubaid Kazmi, IAM, MorganFranklin; Tom Malta, CEO/Principal at IAM Experts; Perry Menezes, Financial Services, MorganFranklin

About this talk

No end in sight…regulatory mandates continue to increase. In response, many organizations create compliance-driven IAM programs with the assumption that security measures are inherently addressed.  While compliance is still a key driver in IAM initiatives, IAM is evolving into a security and risk-based program with capabilities focused on entitlement management and enforcement of logical access controls. Building a security and risk driven IAM program allows organizations to adopt broader, enterprise-based solutions that are adaptable to usage trends, such a as cloud, mobile and remote office.  User demand will continue to drive program disciplines to transform from a compliance-based program into a true secure business enabler, helping reduce overall risks created by emerging technologies and threats. While compliance and security intersect, they are not considered equal. Join us for a live webinar on the key aspects and benefits of security-driven IAM programs. In this session you'll hear about: * Considerations to building a security-driven IAM program * Key indicators to determine if your IAM program is compliance-driven or security-driven * Benefits of security-driven IAM programs
Identity Defined Security Alliance

Identity Defined Security Alliance

9360 subscribers159 talks
Vendor-neutral talks on reducing the risk of identity-related breaches
This channel brings together the leading identity and security vendors and industry experts to regularly educate security leaders on how to reduce risk through identity-centric strategies. For more resources and education on identity-centric security strategies, visit www.idsalliance.org.
Related topics