Bridging Security and Identity Management

Abstract

Effective security efforts are composed of a complex set of interrelated components including policies, procedures, and technical controls. The interrelation between components is not obvious, and the technical details of security systems can obscure perspective with respect to other critical systems. Security architectures provide a coherent plan to ensure that we meet our IT security goals. But you can't build your security model without an accompanying IAM model as a part of it. This session will discuss models for security and IAM and how they interleave.

Download Resources