Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Header of Novatec Consulting GmbH
Forums it-sa Expo Knowledge Forum A

IAM in the spotlight: Mastering the challenges of NIS2, DORA and eIDAS2

IAM in the context of NIS2, DORA, eIDAS2: Security for digital identities, regulatory requirements, and best practices.

calendar_today Tue, 22.10.2024, 14:15 - 14:30

event_available On site

place Forum, Booth 6-215

Action Video

south_east

Action description

south_east

Speaker

south_east

Themes

Cloud Security Legislation, standards, regulations Governance, Riskmanagement and Compliance Identity and access management

Key Facts

  • Increased modern authentication requirements (MFA)
  • Cross-border interoperability in the context of eIDAS2
  • Resilience of IAM systems (NIS2, DORA)

Event

This action is part of the event Forums it-sa Expo

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

This presentation focuses on Identity Access Management (IAM) and its relevance concerning the European regulatory frameworks NIS2, DORA, and eIDAS2. IAM encompasses the management of user identities and access rights, user verification and authorization, and monitoring of access attempts.

NIS2 (Network and Information Security Directive 2) aims to enhance cybersecurity in the EU by requiring organizations to implement robust, risk-based IAM systems and report security incidents. DORA (Digital Operational Resilience Act) focuses on digital operational resilience in the financial sector, setting requirements for robustness and risk management of IAM systems. eIDAS2 (Electronic Identification, Authentication, and Trust Services Regulation 2) improves the interoperability and security of electronic identification means in the EU, promotes strong authentication methods, and mandates compliance with trust services.

The presentation discusses the challenges of implementing IAM systems in compliance with these regulations. It presents best practices such as multi-factor authentication, federated identities (OAuth/OpenID Connect), and decentralized identities. It concludes by emphasizing the necessity of continuously reviewing and adapting IAM strategies to address evolving threats and regulatory requirements.

This presentation is intended for developers, architects, IT security professionals, compliance, and risk managers who seek to understand the integration of IAM into existing infrastructures and compliance with regulatory mandates.
... read more

Downloads

Language: German

Questions and Answers: No

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.