24.04.2008 16:30-17:30

2nd European Identity Conference
Combined Session


<a J�rg Asma, KPMG

Panel: Role-based Analytics for Effective GRC – How to Quickly Deploy IT Controls to Address Regulatory Requirements

In last year´s conference, we reviewed the use of pattern recognition analytics to quickly and effectively build and manage a role-based privileges model for Identity Management and automated provisioning.

In this panel, we discuss the use of same analytical capabilities to quickly and effectively identify and remove access rights that violate compliance requirements, result in excessive risk, or are simply inconsistent with policies and common practices. The technologies presented are generic and can be applied across all IT infrastructure and business applications, and at any level of granularity.

Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.