Identity as the Foundation for Access

Logo
Presented by

Natalie Timms, Security Consultant and Advisor

About this talk

Data and resource accessibility has come a long way. From private networks to enabling connectivity across the internet to outsourcing them in the cloud. One thing that hasn’t changed is the need to track who is using our resources and viewing our data. The concept of identity has remained one of the cornerstones of security. The ability to identify and control access to cloud-hosted offerings has increased the need for tight security measures that are only effective if we understand “who, what and where”. In this session we’ll • Outline typical cloud-hosted capabilities; • Identify their user groups and roles; • Look at identity components that are applicable to cloud services; and • Introduce the concept of outsourcing Identity Management as a Service (IDaaS).
Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (787)
Subscribers (198318)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.