Posted on 09-10-2017
Today’s reality shows that controlling access is a cornerstone for any organization, be it from a business or compliance perspective. E-commerce, e-business, e-government would all be impossible without knowing who is accessing your services. Topics like data and privacy protection are impossible without proper control of access up to a level of “need to know”. Therefore the topic access control is basically in every relevant security best practice or standard.
Looking forward to the upcoming European Trust Regulation it will change the game towards reliable and trustworthy e-Identities and cross-border authentication. Organizations start to understand that IAM and/or e-Identity are so vital that they have a chief IAM- or e-Identity-officer.
Good IAM solutions are key to stay in control, but do we fully understand IAM and has your organization a mature IAM-strategy? And what to do with the technical and architectural challenges of combining new technologies and old technologies in a user-friendly way.
Every day we are warned that simple passwords are no longer enough and strong authentication is a must… we get specific questions about privileged user access and compliance monitoring….
And just when you thought you tackled it there comes a new challenge called the “cloud”….
Controlling access is a cornerstone for any organization, be it from a business or compliance perspective. Indeed ecommerce, ebusiness, egovernment are all impossible without knowing who the person is who is accessing your services. Indeed topics like data & privacy protection are impossible without proper control of access up to a level of “need to know”. It is for a reason that the topic 'access control' is basicly in every relevant security best practice or standard. Access control is a key topic in ISO2700x, in NIST, in PCI, etc, etc. With the coming of the European Trust Regulation we are even upping the game towards reliable/trustworthy eIdenties and cross-border authentication. Some organizations consider IAM and/or eIdentity so vital that they even have a chief IAM- or eIdentity-officer.
The question is whether we already understand IAM fully and whether your organization has a full and mature IAM-strategy? Furthermore there is the technical / architectural challenge of combining new technologies and old technologies. At the same time people want to have user-friendly and convenient solutions and we get warned every day that simple passwords are no longer enough and strong authentication is a must. As if this is not enough, we get specific questions in the area of privileged user access and compliance monitoring…. And just when you thought you tackled it there comes a new challenge called the cloud…. And you need to start wondering what privileged user access and compliance management mean in the cloud.
The congress focuses on a senior level audience of end users (senior managers and specialists) who want to stay up to date on relevant trends and developments and know the importance of ongoing investment in IAM solutions.
Why should you attend?
More info: https://iam.heliview.be/