Click here to register

Date: Thursday, August 28, 2014
2:00 PM ET / 11:00 AM PT

Maintaining even the most basic IT security controls is becoming more challenging for organizations as cloud computing, mobile and bring-your-own-device (BYOD) reshape the average corporate network and how it is used. A one-size-fits-all approach to protecting data resources and access to them can make matters even more difficult on this front, especially when passwords really should be going the way of the dodo and access privileges to any number of apps and cloud services are numerous and poorly managed. Compounding the situation, when security controls such as mobile device management (MDM), multifactor authentication and encryption are put in place, end-users disliking these processes can often work around them. What can your enterprise do to get an ID management and access strategy and vision in place that can protect your core assets? What should be included in policies and how can organizations stay nimble enough to change these as necessary and re-work both over-arching IT security strategies and the technologies that support them to ensure the best protections are in place? We’ll investigate.

Pam Dingle, Senior Technical Director, Ping Identity
Illena Armstrong, VP, Editorial, SC Magazine

Sponsored by: