Cybersecurity with IAM as the Cornerstone of a Robust Security Achitecture (DE)
There's an on demand webinar available for this event
Learn how Identity Access Management (IAM) serves as the key to a robust IT security architecture. This German on-demand webinar highlights the “Identity First” approach and shows how the principles of Zero Trust, Single Sign-On (SSO), Multi-Factor Authentication (MFA) and “Least Privilege” effectively minimize the attack surface. In addition, the importance of the IAM segments IGA, AM/IdP and PAM for a holistic security strategy is explained and illustrated in a big picture.
Date
Time
Speakers
Detlef Sturm
Senior Business Consultant & Product Evangelist
Detlef Sturm, Senior Business Consultant and Product Evangelist at Beta Systems, has more than 20 years of experience in the field of Identity and Access Management (IAM). Among other things, he was responsible for the development of Access Intelligence solutions. His current focus is on access design, particularly in the areas of role mining and role engineering.
In this on-demand webinar, IAM expert and product evangelist Detlef Sturm explains the central role of Identity Access Management (IAM) within a robust cybersecurity architecture.
Content of the webinar
In view of the increasing number of cyber attacks and the ever more complex threat situation, cybersecurity is a topic of great relevance. The focus has shifted to digital identities and the management of their permissions. The concept of “Identity First” places the protection of identities at the center of the security architecture. With this new approach, identities form the primary perimeter security, putting other aspects such as devices, networks or firewalls in second place.
Expanding this approach to include “zero trust” means that every user and every device, even within the perimeter, is fundamentally distrusted. This makes continuous identity verification a necessity. Because identities are considered the primary security factor, security measures such as single sign-on (SSO), multi-factor authentication (MFA) and the Principle of “Least Privilege” are essential to minimize an organization's attack surface.
In the context of these measures, which are required by regulations such as NIS2 and DORA, IAM plays a central role. The IAM market can be divided into three main segments:
Identity Governance and Administration (IGA),
Access Management/Identity Provider (AM/IdP) and
Privilege Access Management (PAM).
Each of these segments contributes significantly to the implementation of the “Identity First” approach.
IGA takes over the central administration of identities and their authorizations and distributes them to the respective applications. Access control (authorization) usually takes place within the applications.
AM/IdP provides a central authentication service and offers SSO, MFA and other identity-related functions.
PAM focuses on managing and monitoring privileged identities and accounts.
The webinar shows how IAM components act as a protective shield in cybersecurity. A step-by-step big picture is developed, illustrating the relationships and interactions between the various components and principles to create a holistic and robust security architecture.
Webinar Details
Type: On-demand webinar (recording)
Available from: 16 December 2024, 4:00 p.m.
Duration: approx. 30 minutes
Language: German
Speaker: Detlef Sturm
Who should attend the webinar?
The webinar is aimed at IT security managers and CIOs, compliance officers, IT architects and anyone interested in building a secure and efficient IT infrastructure.
It is particularly relevant for companies that are facing the challenge of meeting current security requirements such as NIS2 and aligning their security architecture accordingly.
Key takeaways and benefits
The strategic importance of IAM: Find out why IAM is an indispensable part of modern IT security strategies and how it helps protect companies in the long term.
Big picture of the IAM security architecture: Understand the interaction of different IAM components for a holistic and future-proof IT security strategy.
Get expert insights: If you have questions related to the webinar content, please send an e-mail to info@betasystems.com. Our IAM expert will answer your questions either in the next webinar or directly via e-mail.
Register and watch from December 16
Register now for free to receive the link to the on-demand webinar on December 16. You can then watch the webinar at any time.