
Minimizing cyber risks: holistic approaches in Identity & Access Management
Find out how you can protect access data and always know who is accessing which systems and data and why.
Topic
Identity and access management
When & Where
Details
Format:
Technology lecture
Session description
Whether insider job, social engineering or access brokerage, the variety and creativity of ways to gain unauthorised access to organisational data seem to be limitless.
In all cases, however, the issue is always the same: access information.
This must be protected and the organisation must be able to know at all times who is accessing which systems and data and why.
Take part in this presentation to receive information on the following topics, among others:
Comprehensive Identity & Access Management and the Zero Trust approach
Provisioning: Providing access in the context of the necessary authorisations with the correct access rights as part of least-privileged access
< ...
In all cases, however, the issue is always the same: access information.
This must be protected and the organisation must be able to know at all times who is accessing which systems and data and why.
Take part in this presentation to receive information on the following topics, among others:
Comprehensive Identity & Access Management and the Zero Trust approach
Provisioning: Providing access in the context of the necessary authorisations with the correct access rights as part of least-privileged access
< ...
Moderator
