Identity & Access Management (IAM)

Identity & Access Management (IAM)
Identity & Access Management (IAM)

Date/time: Available on demand

Click here to register for free

How do you determine whether IAM improvement initiatives have delivered the expected level of enterprise benefits? If benefits do not meet expectations, how do you uncover the root cause and identify better practices to help IAM stakeholders realize expected improvements in controls and lower risk levels?

Understanding the need for investment in Identity & Access Management (IAM) projects and how to make these projects successful are critical issues for many companies. Please join KPMG for this webcast and hear more about key findings from a recent survey of information technology and information security leaders regarding the current and planned state of their identity and access management initiatives and processes. The survey's objective was to look at what was working and to provide insight into what wasn't. It included questions on current and expected IAM maturity levels, program scope and elements, and reasons for implementing an automated IAM process.

Featured speakers

Greg Bell, Global Leader, Information Protection and Business Resiliency Services (IPBR), KPMG LLP

Naynesh Patel, Senior Manager, Information Protection and Business Resiliency Services (IPBR), KPMG LLP

 Brandon Gunter, Senior Manager, Information Protection and Business Resiliency Services (IPBR), KPMG LLP

 

Sponsored by 



www.kpmg.com

close

Next Article in Vendor Webcasts

More in Vendor Webcasts

Why NAC? Why now?

Why are so many enterprises rushing to implement network access control (NAC) now? Watch this webcast to learn about the many uses of NAC.

Security Based on Trust, Not Fear

Security Based on Trust, Not Fear

Trust is essential for building a sustainable business. Security is essential for building trust. To build that trust in electronic networks, security needs to be built into a suitable framework, ...

Unknown Targeted Attacks - Stopping malware at the endpoint

Unknown Targeted Attacks - Stopping malware at the ...

The threat of Targeted Persistent Attacks (TPAs) continues to grow and nearly every day there is another headline about an organization being breached and critical data stolen. Organizations must ask ...