Enabling the Future of Identity and Access Management
Event submitted on Saturday, April 10th 2021, approved by Content Team ✓
This event has been tagged as follows:
[edit this info]
Kuppingercole is a huge fan of ours; in particular, they’ve been a consistent sponsor of our security conference directory, so we’d like to thank them and testify to the consistency of their events – highly recommended! Traditional enterprise Identity and Access Management (IAM) technologies have been found to be inefficient and ill-equipped to tackle the scale of challenges posed by remote working as a result of Covid-19. The WFH trend looks like it will be continuing for a while more which makes it all that more of a challenge for Cybersecurity Companies. Most industries have been found to be inefficient and ill-equipped to handle the scale of challenges posed by remote working. With this in mind, this (highly recommended) KCLive Security Event on IAM aims to aggregate intelligence about the current state of affairs and assist security leaders in enabling their workers to safely, effectively, and easily access sensitive resources.
Conference Event Summary
The following description was either submitted by the Conference Organizer on Saturday, April 10th 2021, or created by us.
The ongoing pandemic is putting a spotlight on traditional enterprise Identity and Access Management (IAM) solutions – largely mature systems in most companies have been found to be inefficient and ill-equipped to handle the scale of challenges brought about by remote working. With this in mind, our KCLive Event on IAM aims to consolidate information about the status quo and help security leaders enable their employees to access critical resources securely, quickly, and efficiently.
Join this KCLive Event to learn how to implement an interconnected IAM architecture designed for the post-pandemic era. Thought leaders, senior practitioners, and security professionals come together to discuss the need for onboarding users via identity proofing, highlight future risk-oriented authentication methods, and demonstrate how to manage employee and non-human identities in increasingly digital environments.