How to Prepare for IAM Program - A Step by Step Product Neutral Approach

Presented by

Mayank Vaish, Lead Consultant, Identity & Access Management Practice, Aujas

About this talk

Today, the need to deploy security controls for managing digital identities and associated access is pretty well understood and expressed across industries and geographic regions. There is enough literature in the public domain emphasizing why IAM is a must and what all can go wrong if a specific product is not implemented. While product centric material is available in plenty, there is limited guidance available for information security professionals to prepare themselves and their organizations for IAM, neutral of the product. “68% of the security leaders claim they ran successful IAM programs; the top reason attributed to the success is detailed planning and preparation.” As part of preparation and planning for IAM program, information security professionals need to understand the concepts and approach to tackle several pertinent matters. In this webinar we will take you through a step by step approach from a practitioner’s perspective, covering all these concerns and the related topics

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (9)
Subscribers (1297)
We are a holistic global information risk management company with customers across North America, APAC and Middle East. We help organizations manage information security risks by protecting data, software, people and identities, in-line with compliance requirements and best practices. We also help strengthen security governance and intelligence frameworks. Our Service portfolio includes Risk Advisory Services, Identity and Access Management services, Threat Management services, Security Intelligence and Operations, and Digital Security Services. Our Security Analytics and Visualization Platform (SAVP) is an AI platform that provides custom-built solutions and managed services to solve organization specific security problems using advanced analytics and visualization capabilities for use cases such as vulnerability management, 3rd party risk management, data leakage, client assurance, product security, and SIEM enhancement. To know more - please visit us at