
IAM in the cloud - your invisible enemy or strongest ally?
The role model for the cloud. How to integrate processes and avoid stumbling blocks in practice.
Tickets
Get your expo ticket now!Topic
Cloud SecurityData protection / GDPRData security / DLP / Know-how protectionLegislation, standards, regulationsGovernance, Riskmanagement and ComplianceIdentity and access management
When & Where
Details
Format:
Management lecture
Session description
Business to Identity is an elementary pillar when it comes to comprehensively addressing access risks - beyond the perimeter, all the way to the cloud.
The essential contents for the success of secure cloud access are highlighted in a practical manner. A correctly defined role model ensures the future viability of the company and is the basic building block for achieving strategic security goals.
What are the success factors of a scalable role construct that corresponds to the added value? How can a smart role organisation be established?
The essential contents for the success of secure cloud access are highlighted in a practical manner. A correctly defined role model ensures the future viability of the company and is the basic building block for achieving strategic security goals.
What are the success factors of a scalable role construct that corresponds to the added value? How can a smart role organisation be established?
Moderator
