IBM Verify

IBM Verify

Join this online user group to communicate across Security product users and IBM experts by sharing advice and best practices with peers and staying up to date regarding product enhancements.

 View Only

IBM Security Presentations from the 2019 Gartner IAM Summit

By Katherine Cola posted Wed December 18, 2019 10:11 AM

  

If you missed the 2019 Gartner IAM Summit in Las Vegas last week, here is a look at the four key speaking sessions from IBM Security. Click the links below to view the presentation decks, and make sure to join the IBM IAM Community to stay up to date with our access management, identity governance, and privileged access solutions. 

Join the Community here: http://ibm.biz/ibm_security_iam_group 

 

Session Title: Smart Identity for the Hybrid Multicloud World

Speaker: Jason Keenaghan

Listen to the Recording
!

Identity should be smarter and smart identity adapts. Learn how IBM's solution for multicloud identity and access management can securely connect every user, API, and device to every application inside and outside the perimeter. With smart identity, access controls become continuous rather than static. Intelligent governance manages identities, informing you of outliers. Proactive threat mitigation steps up to protect your organization from threats when risk is detected. Join Jason Keenaghan to learn about the disruptive technologies and services that will make identity smarter; Adaptive Access, Identity Analytics, and Decentralized Identity.



Session Title: Beating Breaches with a Proven PAM Framework

Speakers: Dustin Hoff, Bert Vanspauwen 

Privileged access management (PAM) is one of the most critical security controls to implement but often one of the most challenging to deploy. Many organizations face numerous challenges with PAM, such as how many or where privileged accounts exist or how to develop the right access policies for privileged administrators to effectively reduce risk. In this session, come engage in discussion with PAM experts who have helped many clients mature their programs. You will hear practical advice on how to build and/or strengthen your overall PAM program with a proven framework, and learn about the strategies needed to make PAM programs successful. The focus of this session will cover the key considerations and elements when planning, designing, implementing, and managing a world-class PAM program. 



Session Title: How CIAM Programs Successfully Balance Security & User Experience to Grow the Business

Speakers: Martijn Loderus, Sean Brown

Listen to the recording!

Where enterprise IAM begins with a closed network and a measure of trust, Consumer IAM does not; it is open to the world, and trust needs to be established and re-established over the lifetime of consumer interactions. Businesses must deliver seamless omnichannel experiences to capture and hold consumer interest. This is supported through mobile engagements, and new applications centered on increasingly personalized experiences. How can IAM leaders engage with the lines of business to drive these seamless experiences, while keeping a balance on risk? Join Martijn Loderus and Sean Brown to learn three ways IAM leaders can trust and verify their customers to drive the seamless omnichannel experience the business demands.

 

Session Title: Thycotic & IBM Security — Combating Insider Threats with a CARTA Approach to PAM
Speakers:
Jai Dargan, Jason Keenaghan 


Stopping insider threats remains one of the most significant challenges facing security teams today. Join Jai Dargan, VP of Product Management at Thycotic, and Jason Keenaghan, Director of Offering Management at IBM Security, as they discuss how organizations can leverage a CARTA approach to PAM, IAM, and IGA controls to prevent insider threats.

 


 

0 comments
49 views

Permalink