Player FM 앱으로 오프라인으로 전환하세요!
44. Security: 5 Pillars of Identity and Access Management
Manage episode 299804414 series 183220
Identity and access management (IAM) is a balancing act. On the one hand, organizations need to mature their capabilities as corporate assets increasingly live outside the traditional security perimeter. On the other hand, this can’t come at the cost of complicating the end-user experience. By focusing on five pillars of IAM, organizations can strike a balance, and give the right users the right level of access to enterprise resources at the right time. On the latest episode of World Wide Technology’s TEC37 series on Security, join host Robb Boyd as he speaks with WWT’s Matt Wampler, Principal Security Consultant, and Maafu Shabaz, Principal Consultant. They’ll discuss how organizations can adopt identity principles and practices to drive a cohesive, strategic approach to IAM.
Presenters
WWT Related Content
Thales Cipher Trust Tokenization Lab
CyberArk Privileged Account Management Lab
RSA Identity Governance and Lifecycle (IGL)
Five Considerations for Successful Identity and Access Management Architecture
83 에피소드
Manage episode 299804414 series 183220
Identity and access management (IAM) is a balancing act. On the one hand, organizations need to mature their capabilities as corporate assets increasingly live outside the traditional security perimeter. On the other hand, this can’t come at the cost of complicating the end-user experience. By focusing on five pillars of IAM, organizations can strike a balance, and give the right users the right level of access to enterprise resources at the right time. On the latest episode of World Wide Technology’s TEC37 series on Security, join host Robb Boyd as he speaks with WWT’s Matt Wampler, Principal Security Consultant, and Maafu Shabaz, Principal Consultant. They’ll discuss how organizations can adopt identity principles and practices to drive a cohesive, strategic approach to IAM.
Presenters
WWT Related Content
Thales Cipher Trust Tokenization Lab
CyberArk Privileged Account Management Lab
RSA Identity Governance and Lifecycle (IGL)
Five Considerations for Successful Identity and Access Management Architecture
83 에피소드
Усі епізоди
×플레이어 FM에 오신것을 환영합니다!
플레이어 FM은 웹에서 고품질 팟캐스트를 검색하여 지금 바로 즐길 수 있도록 합니다. 최고의 팟캐스트 앱이며 Android, iPhone 및 웹에서도 작동합니다. 장치 간 구독 동기화를 위해 가입하세요.