Identity Access Management in Enterprise IT
Businesses and organizations are under increased regulatory scrutiny when it comes to protecting access to critical information. Identity Access Management (IAM) technologies can be used to initiate, record, and manage user identities and their access permissions to provide oversight and visibility into all aspects of the company user base. It is important for IT leaders to have a comprehensive system to control user access by identifying users and their roles, updating as needed, assigning levels of access, and protecting sensitive data within the system with the appropriate security measures. These tightly controlled and automated systems align with the increasing security requirement.
What Will This Webinar Address?
- IAM in enterprise IT addresses the following:
- Creating one digital identity for each end user
- Defining and Managing Roles and Access Privileges of users and devices
- Managing access to cloud and on-premises applications
- Onboarding and offboarding individuals
- Maintaining and modifying access across each device as needed
- Track user activities
Who should attend?
CFO’s, CTO’s, CISO’s, CIO’s, IT Directors, Compliance, and Security Professionals
About Mark Houpt
Chief Information Security Officer @DataBank. Ltd
Mark brings over 25 years of extensive information security and information technology experience in a wide range of industries and institutions. Mark holds an MS-ISA (Masters Information Security and Assurance) and numerous security and technical certifications (CISSP, CCSP, CEH, CHFI, Security +, Network+). Mark is an expert in understanding and interpretation of FedRAMP, HIPAA, and PCI-DSS compliance requirements. Mark is an active member of ISC2, ASIS International, COMPTIA, IAPP, and ISACA.