Identity & Access Management , Security Operations

IAM: Are you all in or just dipping your toes?

CyberEdBoard Executive Member, Arun DeSouza, guest speaks on panel at ISMG Identity & Access Management Virtual Cybersecurity Summit

In this panel session we talk to three security veterans about how their IAM challenges have been compounded since going remote and what security controls they’ve put in place to assist this change. We also discuss the importance of adopting a holistic identity strategy and how to get the business on side to support this.

See Also: Live Webinar | The Role of Passwords in the Hybrid Workforce

Join this exclusive panel for unique insight into:

  • IAM risks organizations have accepted this year;
  • The importance of adopting a holistic IAM strategy and how to do it;
  • Emerging IAM trends and technologies.

About the Author

Information Security Media Group

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 28 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 28 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from the North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global Summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.