Access Management , Business Continuity Management / Disaster Recovery , COVID-19

Why It's Time to Update Your IAM

Amin of Ping Identity and Krishnamurthi of LikedMinds Consulting Preview Virtual Roundtable
Baber Amin, CTO, Ping Identity; Ram Krishnamurthi, LikeMinds Consulting

Why do so many enterprises remain chained to outdated and vulnerable identity and access management technologies – legacy systems that rely on passwords, eat budgets and kill productivity? Baber Amin of Ping Identity and Ramnath Krishnamurthi of LikeMinds Consulting preview a new virtual roundtable on Modernizing IAM.

See Also: Beyond MFA: The Trick to Securing Machine Identities

In a video interview advancing this roundtable, Amin and Krishnamurthi:

  • The definition of modern IAM;
  • What keeps organizations tied to legacy investments;
  • How to measure success in the modern IAM journey.

Prior to being named CTO of Ping Identity, Amin served as Senior Director of product management for IDaaS solutions at Oracle Corp. and CA Technologies. Before that, he served as Director of Cloud Security with Novell Identity and Security.

Krishnamurthi is the founder of LikeMinds Consulting Inc, a multi-national consulting organization with a vision of bringing innovation to data security and help organizations to deliver the best value to their customers. The firm provides consulting, systems integration, and managed services and focuses on identity management, application security, governance, risk, and compliance solutions.

To learn more about this upcoming roundtable, please visit the registration page.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.