Back

Five decades of IAM have passed, from Facility Access Control to Zero Trust, from simple password to complex password to passwordless â?" Did we make any progress? A review of best practices when considering improving your IAM security posture.

Thought Leadership - 6:45 pm - 9:00 pm

Strategizing your next IAM move is an easy 3 steps process: 

(1) where is your data? who needs access to your data? 

(2) what is the desired user journey to access the data? one that will balance between user convenience and security. 

 (3) monitor the risk and make changes if needed. Seems easy, doesn't it? So one should be aware of many small challenges that may arise along the way, like â?" how can I address my data protection needs for both of my On-Prem data and Cloud data? How can I create an easy and seamless process to deploy large numbers of users? How can I address the needs of all my users - internal employees, subcontractors, traveling users, manufacturing users, users without a mobile device, customers and more? How can I create an easy Risk-Based process to my users that will reduce my IT overhead? Will I need to create and hold separate, dedicated IAM teams to manage all that? What will be my overall TCO costs be? Can I predict it? What looks easy in theory, can be easy in reality. Please join us for an IAM best practices discussion and also cover the most recent trends in IAM.