Briefings Part 2: Who's accessing your critical data, and what are they doing?

Presented by

Neil Warburton, Security Architect, IBM Security Systems

About this talk

Beyond Traditional Defences Recent security breaches by trusted insiders have propelled Identity and Access Management (IAM) to the top security priority of many organisations.. After all, it’s clear security is only as strong as its weakest link – people – and the press is full of articles documenting the damage people can do. So it’s natural for security managers to want to shore up their IAM infrastructure to avoid similar embarrassment. Some are finding it difficult to understand who has access to their critical data and whether they are using it appropriately. Understanding the full extended environment and by taking associated risks into account is the way to avoid being in the headlines. In other words, whether you are starting from scratch or taking on new IAM challenges such as cloud and mobile, there are certain principles you should follow to build a successful, effective IAM solution. Join Neil Warburton, Security Architect at IBM and learn about the key principles that will help you implement a successful IAM solution. The session will be moderated by John Colley, Managing Director at (ISC)2 EMEA.

Related topics:

More from this channel

Upcoming talks (8)
On-demand talks (301)
Subscribers (115514)
(ISC)² hosts regular panel discussions on hot button infosecurity topics featuring thought leaders and visionaries from the industry who answer questions from the audience.