IAM User Group — Stockholm

 View Only
When:  Jun 3, 2019 from 09:00 AM to 05:00 PM (SE)

Today's organizations need to govern and enforce user access across multiple channels, including mobile, social and cloud. At the same time, they must address business needs such as role management, compliance and audit reporting integration of various user populations.

IBM® Security identity and access management solutions help strengthen compliance and reduce risk by protecting and monitoring user access in today's multi-perimeter environments.

Registration

Please click on the blue Register Now button to register for the event. You will be redirected out of the Community pages to a registration page.

IAM Community
To keep up to date with the latest news about IAM community events, please join the community. See the Sign in or Join button at the top corner.


Agenda:
Agendas are still being , but the following selection of topics should give you a of what will be covered.

Delivering Digital Trust with Identity & Access Management:

IAM has become not only a critical part of any organization's security program, but it also an instrumental part of empowering businesses to deliver new and innovative digital experiences for their customers, partners, and workforce. The initiative of Digital Trust helps you strike the balance between stronger security and delivering a frictionless end user experience.

Authentication Everywhere!

Getting a better understanding of who your users are, and doing so in a frictionless but more secure fashion, has become a major business driver for many organizations. Learn how IBM is providing solutions to allow you to add strong and frictionless authentication across your enterprise, supporting initiatives like:

    • Passwordless Experiences
    • Risk-based Authentication
    • MFA for the Enterprise (VPNs, Linux, Unix, AIX, Windows, IBM Z)
    • Developer-friendly SDKs


Modernize Your IAM Program with Identity Analytics:

The Identity Governance & Administration space is now in its 3rd wave: Security-Driven -> Compliance-Driven -> Risk-Aware. Identity Analytics capabilities have emerged as a critical component to help you get a view of the business risks in your IAM program. Analytics not only critical for providing insights, but how IBM is helping you not only leverage analytics to detect but enabling you to investigate and take action as well.

Getting More Value out of Your ISAM and ISIM Environments with Cloud Identity:

Many organizations are on a journey to cloud adoption. And like any journey, there are many steps that you must go through before you reach your destination. For ISAM and ISIM users, cloud-based IAM capabilities can be added to your environment in approach to provide new capabilities like MFA, federation, SaaS provisioning, access certification, and more.

Identity + Blockchain: Next Generation IAM is Closer Than You Think:

Over the past 12-18 months, there has been interest in how Blockchain technology might support the next generation of IAM systems. The promises of decentralized and self-sovereign identity, which promote user experience and improved privacy controls, are very appealing to any organization looking to reduce both costs and risks. How can you get started, and leverage cloud-based IAM to there?

Offering Insights: Recent Deliverables & Roadmap Outlook:

Learn about recent release deliverables and key focus items for IBM's Access Management, Identity Governance, and Privileged Access Management portfolio, including:

    • ISAM
    • ISIM
    • IGI
    • Secret Server

#ISAM

Location

IBM
Kistagången 6
Kista
Stockholm