1.7e Tutorial: Empowering Modern Security Architecture with Identity Governance
Tracks
Track 5
Tuesday, November 10, 2020 |
4:00 PM - 4:55 PM |
Speaker
Mr Frank Briguglio
Global Public Sector Strategist
Sailpoint
.
Abstract
Federal agencies maintain critical information that could do grave harm to the country and its citizens if accessed by the wrong person. This includes Personally Identifiable Information of federal employees and citizens, proprietary or export-controlled data, or other sensitive material related to national security.
User communities have expanded, data is growing exponentially, and the traditional network perimeter has disappeared. It is no longer feasible to protect our most sensitive assets behind a single network and the fast path for a threat actor to steal data is through a compromised identity. Taking an identity-centric approach to modern security architecture helps organizations protect the weapons that are being used against us – the identity itself.
Integrating identity and security technologies to address a specific requirement is just one piece of the puzzle. A broader business initiative, such as Insider Threat, also requires an identity-centric approach to ensure security and an optimal user experience. The identity-centric security approach provides intelligence-based access to data and applications by integrating IAM infrastructure with cyber security technologies.
Identity has finally transitioned from operational and user experience driven, to being recognized as the core of security. Organizations often struggle to make sense of complex security technologies and hunger for new approaches to solve complex identity security challenges, improve overall security and extract value out of existing investments.
This presentation provides framework and guidance that helps organizations put identity at the centre of their security strategy, optimizing cyber security investments, while controlling risk as IT infrastructures converge.
User communities have expanded, data is growing exponentially, and the traditional network perimeter has disappeared. It is no longer feasible to protect our most sensitive assets behind a single network and the fast path for a threat actor to steal data is through a compromised identity. Taking an identity-centric approach to modern security architecture helps organizations protect the weapons that are being used against us – the identity itself.
Integrating identity and security technologies to address a specific requirement is just one piece of the puzzle. A broader business initiative, such as Insider Threat, also requires an identity-centric approach to ensure security and an optimal user experience. The identity-centric security approach provides intelligence-based access to data and applications by integrating IAM infrastructure with cyber security technologies.
Identity has finally transitioned from operational and user experience driven, to being recognized as the core of security. Organizations often struggle to make sense of complex security technologies and hunger for new approaches to solve complex identity security challenges, improve overall security and extract value out of existing investments.
This presentation provides framework and guidance that helps organizations put identity at the centre of their security strategy, optimizing cyber security investments, while controlling risk as IT infrastructures converge.
Biography
Frank Briguglio, CISSP, serves at SailPoint as a Global Public Sector Identity Governance Strategist. Mr. Briguglio is a recognized thought leader and seasoned cybersecurity professional with more than 20 years of experience in identity, credentialing and access management. He has extensive knowledge of U.S. Government Security and Compliance Standards, and hands on experience in designing, implementing and managing identity and security solutions.
