One of the more complex and challenging IT security issues for organizations today is authenticating user identity and managing access to business-critical networks, data and applications. Identity and Access Management, or IAM for short, has evolved at a rapid pace, spurred on by the rise of Cloud Computing, a growing mobile workforce and, of course, the cybercriminals and hackers who increasingly take advantage of all IT vulnerabilities. In this report, expert Troy McMillan, discusses IAM’s evolution and the challenges it brings to organizations today. By watching this program, viewers will gain better insight into the design, implementation and management of effective Identity and Access Management programs.
After successfully completing this segment you should be able to:
- Understand the challenges IT professionals face in regard to IAM and securit
- Discuss the approach IT and business leaders should take to the design, implementation and management of Identity and Access Management programs
- Identify the common issues organizations tend to overlook with IAM
- Recognize the technology trends and developments that will impact the Identity and Access Management space over the next several years