This page is fully or partially automatically translated.

Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Header of Swiss IT Security Group AG
Forums it-sa Expo Knowledge Forum D

IAM in the cloud - your invisible enemy or strongest ally?

The role model for the cloud. How to integrate processes and avoid stumbling blocks in practice.

calendar_today Thu, 12.10.2023, 12:00 - 12:15

event_available On site

place Forum, Booth 7A-106

Action Video

south_east

Action description

south_east

Speaker

south_east

Themes

Cloud Security Data protection / GDPR Data security / DLP / Know-how protection Legislation, standards, regulations Governance, Riskmanagement and Compliance Identity and access management

Key Facts

  • Identity & Access Management
  • Business to Identity
  • Zugriffsrisiken in der Cloud

Event

This action is part of the event Forums it-sa Expo

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

Business to Identity is an elementary pillar when it comes to comprehensively addressing access risks - beyond the perimeter, all the way to the cloud.

The essential contents for the success of secure cloud access are highlighted in a practical manner. A correctly defined role model ensures the future viability of the company and is the basic building block for achieving strategic security goals.

What are the success factors of a scalable role construct that corresponds to the added value? How can a smart role organisation be established?
... read more

Language: German

Questions and Answers: No

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.