Identity Management

Discover the latest collection of talks and videos on Identity Management from industry experts.

Attend Summits on Identity Management

Identity & Access Management

Identity & Access Management

Managing identities, controls and access to your systems are crucial in a new context rich era. It is essential for businesses to construct sound identity &
access management (IAM) systems to ensure IAM practices are resilient enough to prevent unauthorized data and system access. Join industry experts as t…

|9 sessions
Identity Management and Cloud Security 2020

Identity Management and Cloud Security 2020

As organizations rapidly adopt cloud networks, due to flexibility, scalability, cost effectiveness and more, security needs to be at the front and centre. From
new applications being consistently added to your network to employees taking access control shortcuts and credentials being compromised, it is clear that…

|32 sessions
Identity, Data Protection & Securing the Modern Business

Identity, Data Protection & Securing the Modern Business

Almost every successful cyber attack relies on a compromised identity. With cybercrime on the rise and attackers becoming more sophisticated,
organizations worldwide need to remain vigilant in protecting their data assets and staying up to date on important regulation. Identity management, authe…

|26 sessions
Disrupting Financial Services With Analytics and AI 2020

Disrupting Financial Services With Analytics and AI 2020

With all of the data at their disposal, it's no wonder that major players in the Financial Services industry have turned to big data analytics and AI technology to
help manage and make use of their vast repositories. See how analytics experts and key decision makers at financial institutions are leveraging AI-powered …

|18 sessions
Enterprise Compliance and Access Control

Enterprise Compliance and Access Control

In the process of adopting GRC principles and practices, audit and IT professionals are finding that compliance and security are two sides of the same coin.
Commercial, regulatory and federal mandates can be managed with integrated security approaches like Network Access Control (NAC) and bolstered by eff…

|4 sessions
Cloud Security, Backup and BCDR

Cloud Security, Backup and BCDR

According to Cloud Security Alliance (CSA) research, the top security concern cited is the risk of data breaches, followed by the use of weak identity access
management and insecure APIs. To encourage continued adoption of the cloud, companies need to focus on improving trust and security. Join this month’s …

|16 sessions