...
04.05.2010 09:00-13:00

European Identity Conference 2010
Pre-conference Meeting

Moving beyond the Perimeter: Identity & Access Management for a Networked World

Wherever organizations either use external applications “from the cloud” or where non-employee workforce (a.k.a. consultants, temps, auditors etc.) need to access internal systems, traditional Identity & Access Management tend to fall short.

But how to address the sometime diametral requirements imposed by adding cloud resources and external identities to your mix? The introductory session explains some of the strange requirement combination IAM managers face while trying to give both frontlines sufficient attention. How to integrate the external workforce to your ID Management, how to handle them within your attestation cycles without interfering with business requirements and already stretched budgets? How to securely manage access to and usage of cloud services while at the same time trying NOT to bust the business case by requiring string authentication and authorization with sufficient audit trails? Join Sebastian – and possibly a bunch of practitioners – in this rollercoaster ride through all the ups and downs of creating a security strategy WITHOUT having a perimeter to hide behind!

Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.