Unleashing the power of IAM: Navigating the strategy maze

Wednesday
 
27
 
November
3:50 pm
 - 
4:30 pm

Speakers

Anna-Lena Naumann

Anna-Lena Naumann

Cyber Strategy Consultant
Accenture
Ella Collings

Ella Collings

Market Development Lead
Accenture
Jeffrey Jambu

Jeffrey Jambu

Security Delivery Senior Manager
Accenture
Rachael Hardy

Rachael Hardy

Cyber Security Consultant
Accenture

Synopsis

90% of breaches now involve a breakdown in IAM. 90%. So how might we transform identity to enable business value while reducing risk? We must simultaneously improve user experience, reduce tech debt, reduce risk, and optimise cost. Sounds overwhelming?

Then join us for an insightful panel discussion on the future of Identity & Access Management (IAM) strategy. This panel aims to shed light on the importance and the challenges faced by Chief Information Security Officers (CISOs) worldwide in defining and implementing a robust IAM strategy.

The panel will explore the key reasons why IAM strategy is important such as the need to manage and control user access to critical systems and resources. With the proliferation of cloud services, mobile devices, and remote work, organisations face the challenge of granting appropriate access to employees, partners, and customers while minimising the risk of unauthorised access.

Backed by compelling statistics and industry insights, our panellists will delve into the need for synergy between IAM strategy and the broader Cyber Security Strategy. Our experts will emphasize the importance of these two strategies working together seamlessly to enhance the organiation's security posture.

Additionally, the panel will address the emerging trends in the IAM market. Traditionally, IAM vendors have focused on specific aspects of IAM, such as user provisioning or access management. However, the landscape is evolving, and vendors are now expanding their offerings to cover all areas of IAM. This expansion presents challenges for CISOs. With a wide range of functionalities bundled into a single tool, CISOs need to carefully evaluate the depth and breadth of each vendor's offerings. They must assess whether the vendor's expanded toolset adequately addresses their organisation's specific IAM requirements and aligns with their IAM strategy. Our panellists will explore these trends and discuss the implications for organisations seeking comprehensive IAM solutions and factors to take into account when evaluating a potential IAM vendor.

Don't miss this opportunity to gain valuable insights into the future of IAM strategy and its crucial role in ensuring robust cyber security. Join us for an engaging discussion that will empower you to navigate the challenges of IAM implementation and stay ahead in the ever-changing cyber security landscape.

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Acknowledgement of Country