This resource is no longer available

Countdown: Top Five Technology Challenges of Role and Entitlement Management

When an organization commits to implementing and using the technologies and tools to support role and entitlement management, it faces a number of sizable challenges in implementing, using and ultimately getting the most out of the technology. Some challenges include formal definition of identification processes, assignment of responsibility for approvals, and integration with various identity and access control systems throughout the organization.

In this podcast, Richard Mackey counts down the organizational, process, and technical challenges that face any organization that hopes to deploy role and entitlement management technology effectively.


Richard E. Mackey Jr ISACA/CISM - Vice President of Consulting, SystemsExperts Richard E. "Dick" Mackey is a leading authority on enterprise security architecture and compliance. He has helped many organizations, from online retailers and application service providers to major manufactures assess and improve their security and compliance programs. He has advised leading Wall Street firms on governance and policy, security architecture, identity management, and intrusion detection and analysis. Prior to joining the consultancy SystemExperts, Mackey was the director of collaborative development for The Open Group (the merger of the Open Software Foundation and X/Open). Prior to the merger, he was the Technical Lead of the OSF Distributed Computing Environment (DCE) project. Mackey has been a frequent speaker at conferences and a regular contributor to major publications on topics such as PCI, HIPAA, and GLB compliance, security standards, identity management, and service-oriented architecture security.
Guardium, an IBM Company
20 Nov 2009
Nov 20, 2009

This resource is no longer available.