This resource is no longer available

Demystifying Identity Management

Cover

Regardless of a company's size, managing identity can be a huge undertaking that requires the efficient oversight of many moving parts. This hour-long webcast explores the essentials every security practitioner must know about identity within their organization. We'll start out covering access management fundamentals, including the role directories play and where the authoritative source of identity information lies. Then, attendees will learn the difference between centralized and de-centralized identity management models, as well as best practices for integrating commercial products. They'll see how to move toward automated provisioning, how to effectively establish approval workflows and produce meaningful reports. Additionally, this presentation will cover the intersection of identity management and compliance, and introduce emerging concepts such as how to begin federating identity between organizations.

Speaker

Richard Mackey ISACA, CISM, Principal, SystemExperts
Vendor:
Information Security Magazine
Premiered:
Aug 16, 2006, 09:00 EDT (13:00 GMT)
Format:
Multimedia
Type:
Webcast
Language:
English

This resource is no longer available.