ON-DEMAND WEBINAR

Identity and access management: A Zero Trust discussion

Identity and access management (IAM) are now at the core of any approach to building and maintaining a Zero Trust IT environment. Often viewed as the last mile of security, it turns out that modern security now starts with the ability to verify the identity of not only people but also applications and machines.

Listen to this panelist discussion to learn more about the interplay between IAM and ZTA.

 

  • July 25, 2022
  • On-Demand Webinar

Identity and access management: A Zero Trust discussion

Identity and access management (IAM) are now at the core of any approach to building and maintaining a Zero Trust IT environment. Often viewed as the last mile of security, it turns out that modern security now starts with the ability to verify the identity of not only people but also applications and machines.

IT teams have been relying on directories to manage access for years. IAM platforms, however, take cybersecurity to the level required to combat ransomware attacks that at their core compromise identities to not just disrupt, but to paralyze organizations.

Learn how to leverage IAM platforms to protect your organization from serious attacks.

Panelists will discuss these and other topics:

  • How has remote computing changed the way we think about IAM?
  • What are key challenges in IAM?
  • Do enough people realize that machines and applications have identities?
  • Who is in charge of IAM these days?
  • Has IAM finally come of age in the Zero Trust era?
  • What needs to be done to make IAM simpler?

Speakers

Panelist Host and Speakers also include:
  • Josh Hoge, Senior Sales Engineer – StrongDM
  • Mike Vizard, Chief Content Officer – Techstrong Group

Speakers

Wade Ellery

Field Chief Technical Officer

Wade has extensive experience in enterprise IT direct and channel software, and services, sales and management. He has in-depth knowledge and experience in enterprise IAM, IGA, risk and compliance and IT security challenges.

Want to see more in real-time? Sign up for a demo today

Let’s start a conversation about how an Identity Data Fabric can help you and your unique use cases.