How Can a Company Guarantee a Successful, Strategic Identity Access Management Program?
The Gartner Identity and Access Management Summit is right around the corner and leaders from all over the world will be coming to try to get this question answered. Here are a few ideas from our ten years in the industry.
Strategic Identity and Access Management (“IAM”) projects can be difficult and the new challenges with mobile, social, and cloud compound the problem. Protecting the perimeter is not enough anymore. Safeguarding identities are the key to a truly secure enterprise.
The industry has seen way too many train wrecks with IAM. To get beyond basic capabilities and really use IAM systems as a foundation for strategic IT, a company MUST take the time up front to consider the long-term plan. Near-term, immediate priorities can be solved with client-based single sign-on, basic provisioning, simple roles and audit reports. But with a short-term (and maybe short sighted) plan, a company can just as easily limit their ability to solve more complex problems.
Tony Vera, Senior Certified Security Specialist at IBM.
Ryker Exum, Information Security Consultant at PathMaker Group
Jason Bellomy, Manager of North American Sales for IBM’s Application Security Segment
In this 50 minute webinar you will:
Learn about the top security vulnerabilities that have yet to be addressed
See common live hacking scenarios
Hear about the current trends in mobile app security
Learn how to get a free security assessment for your company
About the key presenter, Tony Vera:
Tony is a Senior Certified Security Specialist at IBM. Since joining IBM in 1995 Mr. Vera has worked as a technical professional, with a wide range of clients in all aspects of the software engineering lifecycle. This work requires skills in the areas of product technical competencies, training, project management, contemporary software engineering technologies, and most recently, application security.
About Ryker Exum:
Ryker is an information security consultant with the Dallas, Texas based consulting firm PathMaker Group. He received his MBA and a graduate certificate from the NSA accredited, University of Dallas Information Assurance program. He holds several professional security certifications including CISSP, OSWP, CEH, and SSCP.
About Jason Bellomy:
Jason manages North American Sales for IBM’s Application Security segment. For 3.5 years he has led the Application Security Sales Team and helped integrate two IBM acquisitions, Watchfire and Ounce Labs, that make up the current IBM Application Security Portfolio.
Best Practices for Protecting Payment Card Data (PCI) to help ensure compliance and reduce risk.
Event Overview
News headlines about the increasing frequency of stolen information and identity theft have focused awareness on data security and privacy breaches—and their consequences.
Payment card use is widespread today. Along with growing global use, the industry has experienced a troubling increase in incidents of financial fraud. In response, the leading payment card companies
worked together to develop a set of technical and operational requirements designed to protect cardholder data, commonly referred to as PCI DSS (Payment Card Industry Data Security Standard).
Recent high profile data thefts, along with industry statistics, indicate significant work remains to be done in most organizations to implement PCI DSS.
Topics to be covered:
•Current trends, issues and concerns around sensitive data security
• PCI and the changing Threatscape
• Looking beyond the compliance checkbox
• The future of the PCI-DSS
• What can be done to harden defenses against the exploitation of privileged users, unauthorized access and information-related vulnerabilities
•How to create a centralized data security platform
Date: April 9th, 2013 IBM Technology Exploration Center (TEC)
1503 LBJ Freeway (Luna and 635), 5th Floor
Dallas, TX 75234-6059
8:30am – 11:00am
Agenda:
8:30 am Breakfast and Registration
8:45 am Welcome and Introduction
9:00 am Keynote – Christian Nielsen, Pathmaker
10:00 am Keynote – Michael Murphy, IBM
11:00 am Closing Remarks
Christian Nielsen, Ph.D., PCI-QSA
PathMaker Group
Christian has over 30 years of experience in security and networking technology. He has earned advanced degrees in Information Systems while staying active in the corporate world. In addition to his corporate career, Christian is training the next generation of master’s degree students in cyber security. Over the last several years, he has worked to assist business clients prevent and remediate the many security and compliance challenges they face.
Michael Murphy
Worldwide Solution Architect
Data Governance Center of Excellence
IBM
Mike Murphy is a Worldwide Solution Architect for the Data Governance Center of Excellence specializing in real-time database protection solutions for reducing risk, simplifying compliance and lowering audit costs.
Over the last six years, Mike has worked with hundreds of customers conducting risk assessments and proposing technology solutions to protect against data breaches, and to ensure adherence to regulatory data protection standards such as HIPAA HITECH, PCI-DSS & SOX 404.