
IAM in the cloud - your invisible enemy or strongest ally?
The role model for the cloud. How to integrate processes and avoid stumbling blocks in practice.
Topic
Cloud SecurityData protection / GDPRData security / DLP / Know-how protectionLegislation, standards, regulationsGovernance, Riskmanagement and ComplianceIdentity and access management
When & Where
Details
Format:
Management lecture
Session description
Business to Identity is an elementary pillar when it comes to comprehensively addressing access risks - beyond the perimeter, all the way to the cloud.
The essential contents for the success of secure cloud access are highlighted in a practical manner. A correctly defined role model ensures the future viability of the company and is the basic building block for achieving strategic security goals.
What are the success factors of a scalable role construct that corresponds to the added value? How can a smart role organisation be established?
The essential contents for the success of secure cloud access are highlighted in a practical manner. A correctly defined role model ensures the future viability of the company and is the basic building block for achieving strategic security goals.
What are the success factors of a scalable role construct that corresponds to the added value? How can a smart role organisation be established?
Moderator
