This resource is no longer available
This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
Many organizations still have highly fragmented access management architectures, labor-intensive processes, and ineffective means for really knowing which personnel have access to what systems, applications and data. Often, tactical solutions are brought in to solve strategic problems that often make the IAM environment more complex without being more secure. This package examines IAM challenges and ways that risk can be truly reduced.