How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy
The move towards cloud applications and remote working has shifted enterprise identities outside the traditional corporate infrastructure. Weak, stolen and re-used passwords are now the cause of two-thirds of all data breaches.
My1Login CEO, Mike Newman, presents on how a robust IAM strategy can address key GDPR obligations, eliminate phishing for critical applications and eradicate shadow IT. Mike’s presentation includes a case study of the security challenges faced by a 2000-user, highly-regulated, enterprise organisation and how they “locked down” access management by putting the business back in control of passwords rather than the users, whilst ensuring a positive, seamless user experience.
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy
1. How to Address GDPR, Phishing and
Shadow IT with a Robust IAM Strategy
Michael Newman
CEO, My1Login
Adrian Romano
Information Security Manager, Betsson Group
“Global Leader in
Identity Management”
IAM Award International Contribution
to Cyber Security
IAM Solution
of The Year
Best Identity
Management Solution
Best Cloud Computing
Security Solution
Identity & Access Management
for Web, Mobile & Thick-Client Apps
2. Eliminate GDPR fines, Phishing and Shadow IT – With One Move!
Agenda
1. Enterprise IAM Challenges
2. Case Study: Betsson Group - Key IAM Challenges
Adrian Romano, Info Security Manager, Betsson Group
3. Critical Considerations for your IAM
4. Case Study: Betsson Group - Business Benefits
Adrian Romano, Info Security Manager, Betsson Group
5. 6 Take-Away Actions
19. Eliminate GDPR fines, Phishing and Shadow IT – With One Move!
Take-away Actions
1. Data must be encrypted at rest – not good enough anymore!! MUST USE CLIENT-SIDE ENCRYPTION
2. Ensure your vendor can integrate ALL apps – legacy, thick-client, virtualised, web, mobile
3. ELIMINATE SHADOW-IT by Auto-Detecting Apps – puts the Business Back in Control of Cloud Apps
4. Use an IAM or IDaaS that can pro-actively update target app passwords and hide these from users to
ELIMINATE PHISHING RISKS
5. Consider IAM vendor sovereignty AS WELL AS data residency
If a User Needs More than one Business Password then they don’t have Single Sign-
On