Information On GCA’s Identity & Privileged Access Management Presentation
Robert Ivey, Chief Technology Officer at GCA, will be speaking about the intersection of Privileged Access Management (PAM) and Identity and Access Management (IAM) programs at the ISACA Governance Risk & Compliance Conference in Tampa, FL on 3/30/18.
The ISACA West Florida Chapter is proud to host the 5th annual Tampa Bay Governance Risk and Compliance (GRC) Conference at The Westshore Grand Hotel, set in the Westshore Business District. The event will kick-off with a key note speaker Kevin McCarthy, Inspirational Speaker, Best-selling Author, Trainer, Coach and author of Amazon #1 Best-Selling book in Financial Risk Management and Business Ethics – Blind Spots. The day will continue with concurrent sessions focused on various GRC topics. The sessions will include current hot topics and provide real world examples along with current technology that is coming on the market.
We are here for you
Allow us to help you pick the best of breed solution for your IAM Issues
Scheduled Topics For The Identity & Privileged Access Management Presentation Include
- The Intersection of Privileged Access Management (PAM) and Identity Access Management (IAM) Programs
- Taking the “R” in GRC Seriously
- Practical Experiences from a CISO Implementing a Comprehensive Security Framework covering PCI, HIPAA, FISMA, NIST, HITRUST, CIS Top 20, ISO, etc.
- Building a Security Culture in Your Organization
- Health IT – Latest Trends, Key Issues, New Requirements and Best Practices
- Third Party Risk Management
- Information Governance – framework and practical experiences
- Adventures in the Cloud
- Building a succinct Information Security Posture from the Top Down
Last year over 200 Tampa Bay Area professionals attended the event, so don’t miss out on this opportunity to meet and network with leaders and peers in your industry.
See more about the conference here.
About the the session:
Robert Ivey will be covering “The Intersection of Privileged Access Management (PAM) and Identity & Access Management Programs.”
Privileged Access Management is a hot topic. PAM technologies provide secured privileged access to critical assets to meet compliance requirements by securing, managing and monitoring privileged accounts and access. Confusion often arises when there is also an Identity Access Management (IAM), or Identity Governance Administration (IGA) tool at an organization as well. PAM and IAM programs are very closely related. There will be overlap, and in some cases, organizations will have implemented functionality using one that should have been implemented using the other. Knowing the intended usage, strengths, and weaknesses of each tool will help make better decisions on where the functionality should be maintained. Security is always asked to do more with less, by implementing the tools in the intended ways and using their strengths, you can increase your security and risk posture with less cost and effort.
His one hour session will take place at 9:50am in the ballroom at the Westshore Grand Hotel in Tampa, FL.