A CISOs Guide to Effective Identity & Access Management (IAM) Practices and Technologies

On-Demand Webcast|1 hour

The secure and efficient administration of user and technology identities across multiple Cloud and on-premises environments has been a challenge for organizations. Consequently, many CISOs are examining new Identity Governance and Administration (IGA) platforms and authentication mechanisms, which will involve large investments and implementation support.

In this CISO Stories webinar, panelists share their experiences dealing with IAM challenges, planned architectures, and technology optimization. They will also discuss best practices and tools developed by a cross sector task force of CISOs, highlighting:

• Effective IAM technologies and practices for the Cloud and hybrid environments
• Rearchitecting IAM
• Artificial Intelligence as an enabler and risk
• Managing privileged users
• Conducting access reviews effectively and efficiently
• Identity and access management for mergers and acquisitions
• Zero Trust

Join us for key insights and tools to help your organization improve the effectiveness of your IAM practices and technologies.


Parham Eftekhari
Executive Vice President, CISO Communities
CyberRisk Alliance

Parham Eftekhari is a business executive specializing in cyber and national security. He currently serves as Executive Vice President, CISO Communities at CyberRisk Alliance, leading its CISO services platform which consists of the Cybersecurity Collaborative and Cybersecurity Collaboration Forum. Parham also serves as the chairman of the Institute for Critical Infrastructure Technology (ICIT), the nation’s leading cybersecurity think tank, which he founded in 2014. Other leadership roles during his more than 15 years in this sector include co-founder and Vice President of research at the Government Technology Research Alliance, founder of the world’s first webcam cover manufacturer CamPatch, and Advisory Board member at the Ready Rock Institute. Parham has developed and authored multiple research publications, regularly engages with the media, and has addressed forums ranging from Congress, TED, RSA, and C-SPAN. In 2017, Parham was recognized by (ISC)2 for his contributions to the field of cybersecurity with the Most Valuable Industry Partner – Government Information Security Leadership Award.

Tom Scurrah
VP, Cybersecurity Programs and Content
Cybersecurity Collaborative

For over 20 years, Tom has practiced as a cyber security professional as an executive director of information security for Verizon, a founder of two cyber security consulting firms, and Vice President of Content and Programs for the Cybersecurity Collaborative.

Tom is CEO of MyDataOnly, Inc., which offers privacy and security consultation and security (penetration) testing services. Tom began his career in IT in programming and strategic planning and later founded a customer satisfaction measurement firm.

Tom holds four security certifications (CISSP, CISM, PCIP) and one privacy certification (CIPP/US). He has a master’s degree from MIT’s Sloan School of Management and is a Marine Corps veteran.

Pete Hazen
VP, Security Architecture & Technical Assurance

Pete Hazen has for the past seven years been leading key information security and IAM initiatives at Radian Group, a financial services company that provides mortgage insurance and real estate services to homeowners and lenders in the continental U.S. While at Radian, Pete was responsible for management and deployment of Radian’s Single Sign-On (SSO), Privileged Access Management (PAM), and Enterprise Data Protection programs. He continues to help lead and facilitate the security assessment process for Radian applications and infrastructure, and the development and automation of security metrics and assurance controls in Radian’s IT environment. Prior to his time at Radian, Pete was a principal consultant, both in a solo capacity and as co-owner of his own 10-person consulting company, managing IAM and other security initiatives for domestic and international businesses in the manufacturing, financial services and healthcare sectors. Earlier in his career, Pete was employed as a principal software/hardware engineer by several Fortune 500 companies focused on IT and product R&D. Pete holds a CISSP and is a graduate of Purdue University, having both BS and MS degrees in Electrical Engineering. Outside of work, Pete is active in his local community, having served as Treasurer and Fundraising chair at multiple non-profit charities in addition to endowment and facilities boards.

Mitchell Greenfield
Director, Core Security Architecture

Mitchell Greenfield is currently AVP Identity and Access Management in Humana’s Enterprise Information Protection (EIP) department. Mitch’s current role is leading the IAM organization to manage over 100,000 identities and thousands of applications. Previously mitch has had roles at Humana including leading the security program for CenterWell Home Health as well as leading the teams responsible for the security merger and acquisition process and the subsidiary security programs. In addition, Mitch has conducted ethical hacking and penetration testing for Humana, including business partners and acquisitions. Mitch maintains his Certified Information Security Auditor (CISA) and has previously held certifications including Certified Ethical Hacker (CEH), Certified Security Analyst (ECSA), Licensed Penetration Tester (LPT), and Certified Information Security Auditor (CISA). Mitch is also involved with the executive advisory boards for key security companies, including SkyHigh Security, F5, Yubico and Forescout. Mitch is past President for the Kentuckiana chapter of ISACA and holds an M.S. in Information Systems and a B.S. in Informatics from Indiana University – Bloomington