Technology sprawl is a challenge every CISO deals with. From legacy hardware to shadow IT, the sheer number and functionality of applications used within your infrastructure is a venerable melting pot of security risk. Each of us deal with applications that are so old they can't be patched, and which are being accessed by the same modern device that has dozens, if not hundreds, of untrusted apps on it. At the end of the day, the only hope we have of protecting our enterprises from attack is by being able to continually and accurately validate access, and to do that, we must be able to truly manage our users.
In “Zero to 60 in 180 Days,” during Executive Alliance’s National Security Leaders Symposium from October 27th – 29th, we will take a look at what it takes to roll out a true Identity Access Governance platform, across four geographically-disperse and application independent organizations, generating a true, enterprise-wide single source identity warehouse. We’ll touch on the challenges presented, the approach, and the gotchas of deploying an IAG solution in today’s distributed, diverse enterprise infrastructure.