Be the first to like this
(Part 1) The importance of Digital Identity and Access Management continues to grow in the field of cybersecurity. IAM still ensures “the right access to the right people at the right time for the right reasons,” but other issues like new regulations, cyber-espionage, insider threats, IoT, and privacy concerns have made IAM one of the fastest growing segments of IT. Unfortunately, it can also be one of the most confusing to understand.
New technology and new use cases bring with them new terminology and new practices. For identity practitioners who are early in their career, security leaders and executives responsible for identity systems, it can be difficult to even figure out where to start. Every explanation seems to reference a multitude of other practices and dozens of confusing acronyms. Even seasoned professionals can loose track of what's new, especially if it's outside of their immediate area of focus.
This workshop -- provided by IDPro -- will provide a comprehensive (and fun) introductory view of the identity world that will give participants a solid understanding of IAM’s foundations.
Part 1 of this 2-part class begins with the basics like directories, identity proofing, provisioning, authentication (including multi-factor), authorization, as well as federation technologies like SAML, OAuth, and OpenID Connect.
In Part 2, we build on those foundational technologies to explain PKI & digital certificates, privileged access management, identity for IoT, identity assurance, privacy issues, identity standards organizations, and even known attack vectors.