Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Header of Beta Systems Software AG
Congress@it-sa Lecture programme

Sichere Identitäten: Cyberhygiene und IAM im Unternehmensalltag

Introduction to Identity Access Management with a focus on the integration of an IAM solution in Windows AD and Azure to improve IT security

calendar_today Wed, 23.10.2024, 11:30 - 12:30

event_available On site

place Room Neu-Delhi, NCC Ost

Action description

south_east

Speaker

south_east

Key Facts

  • Garancy seamlessly integrates IAM with AD and Azure AD
  • Segregation of duties minimizes risks in IT infrastructures++Compliance with BAIT, ISO 27001 and NIS2 requirements

Event

This action is part of the event Congress@it-sa

Action description

This presentation provides a comprehensive introduction to Identity and Access Management (IAM), focusing on the integration of an IAM solution with Windows Active Directory (AD) and Azure AD.

We explain how an IAM system such as Garancy can be used to effectively manage identities and access rights in hybrid IT infrastructures.

The presentation will also cover the implementation of Separation of Duties (SoD) through an SoD matrix to minimize the risk of fraud and errors. Another focus is on compliance with regulatory requirements such as BAIT, ISO 27001 and the NIS2 Directive. The integration of Garancy with AD and Azure AD helps companies to ensure IT security and compliance in complex IT environments. Practical examples illustrate the automated provisioning of user rights and the role of the SoD matrix in ensuring compliance and security.

Finally, an outlook is given on future developments in the area of IAM and SoD, particularly with regard to advancing digitalization and the growing requirements for cybersecurity and data protection.

... read more

Participation Limit: 55

Language: German

Questions and Answers: Yes

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.