A CISOs Guide to Effective Identity & Access Management (IAM) Practices and Technologies

On-Demand Webcast|1 hour

The secure and efficient administration of user and technology identities across multiple Cloud and on-premises environments has been a challenge for organizations. Consequently, many CISOs are examining new Identity Governance and Administration (IGA) platforms and authentication mechanisms, which will involve large investments and implementation support.

In this CISO Stories webinar, panelists share their experiences dealing with IAM challenges, planned architectures, and technology optimization. They will also discuss best practices and tools developed by a cross sector task force of CISOs, highlighting:

• Effective IAM technologies and practices for the Cloud and hybrid environments
• Rearchitecting IAM
• Artificial Intelligence as an enabler and risk
• Managing privileged users
• Conducting access reviews effectively and efficiently
• Identity and access management for mergers and acquisitions
• Zero Trust

Join us for key insights and tools to help your organization improve the effectiveness of your IAM practices and technologies.

Speakers

Parham Eftekhari
Executive Vice President, Collaboration
CyberRisk Alliance

Parham Eftekhari is a recognized business executive in the information security sector with a lifelong passion for leadership, and community engagement. His expertise spans critical infrastructure technology and policy, business strategy and operations, executive advising, and thought leadership content initiatives.

Parham has published over a dozen information security reports, regularly engages with the media, and has contributed to countless briefings and events at institutions including TEDx, Congress, the World Bank, RSA, IFA+, (ISC)2, C-SPAN, and the Institute for Critical Infrastructure Technology (ICIT).

Tom Scurrah
VP, Cybersecurity Programs and Content
Cybersecurity Collaborative

For over 20 years, Tom has practiced as a cyber security professional as an executive director of information security for Verizon, a founder of two cyber security consulting firms, and Vice President of Content and Programs for the Cybersecurity Collaborative.

Tom is CEO of MyDataOnly, Inc., which offers privacy and security consultation and security (penetration) testing services. Tom began his career in IT in programming and strategic planning and later founded a customer satisfaction measurement firm.

Tom holds four security certifications (CISSP, CISM, PCIP) and one privacy certification (CIPP/US). He has a master’s degree from MIT’s Sloan School of Management and is a Marine Corps veteran.

Pete Hazen
VP, Security Architecture & Technical Assurance

Pete Hazen has for the past seven years been leading key information security and IAM initiatives at Radian Group, a financial services company that provides mortgage insurance and real estate services to homeowners and lenders in the continental U.S. While at Radian, Pete was responsible for management and deployment of Radian’s Single Sign-On (SSO), Privileged Access Management (PAM), and Enterprise Data Protection programs. He continues to help lead and facilitate the security assessment process for Radian applications and infrastructure, and the development and automation of security metrics and assurance controls in Radian’s IT environment. Prior to his time at Radian, Pete was a principal consultant, both in a solo capacity and as co-owner of his own 10-person consulting company, managing IAM and other security initiatives for domestic and international businesses in the manufacturing, financial services and healthcare sectors. Earlier in his career, Pete was employed as a principal software/hardware engineer by several Fortune 500 companies focused on IT and product R&D. Pete holds a CISSP and is a graduate of Purdue University, having both BS and MS degrees in Electrical Engineering. Outside of work, Pete is active in his local community, having served as Treasurer and Fundraising chair at multiple non-profit charities in addition to endowment and facilities boards.

Mitchell Greenfield
AVP, Identity and Access Management
Humana

Mitchell Greenfield is currently AVP, Identity and Access Management at Humana. Mitch leads a team of around 200 identity specialists focused on managing identity risk for large complex health care organization. Previously Mitch was the Information Security Officer for CenterWell Home Health in Humana’s Enterprise Information Protection (EIP) department. Mitch lead the security program for CenterWell Home Health as well as the teams responsible for the security merger and acquisition process and the subsidiary security programs. Previously, Mitch conducted ethical hacking and penetration testing for Humana, including business partners and acquisitions. Mitch previously held his Certified Information Security Auditor (CISA) and has previous held certifications including Certified Ethical Hacker (CEH), Certified Security Analyst (ECSA), Licensed Penetration Tester (LPT), and Certified Information Security Auditor (CISA). Mitch is also involved with the executive advisory boards for key security companies including SkyHigh Security, F5, Yubico and Forescout. Mitch is past President for the Kentuckiana chapter of ISACA and holds an M.S. in Information Systems and a B.S. in Informatics from Indiana University – Bloomington.

0%