Is Your Identity Management Comprehensive Enough? Are You Just Tipping Your Toes?
The critical components of an identity strategy, experts say, are to capture the data domains, engage using MFA, manage by providing user attributions, and administer managing identities from unauthorized sources. But are they adequate? Are you taking a piecemeal approach that does not help in compliance? Any written IM policy that can’t be enforced becomes ineffective.
See Also: Expel: Firms Still Threatened by Old Vulnerabilities
The session will cover:
- Components of a comprehensive identity management program
- How to balance between authentication and user experience
- How to manage the identity of your vendor partners