An IAM Approach to Cybersecurity: Building on Zero Trust
The critical components of an IAM strategy, experts say, are to capture the data domains, engage using MFA, manage by providing user attributions and administer managing identities from unauthorized sources.
See Also: Webinar | Prisma Access Browser: Boosting Security for Browser-Based Work
Some say implementing an IAM framework is complex, and integrating with security is a big task and expensive too. Enforcing centralized granular password policies across active directory and cloud applications is a Herculean task.
The session covers:
- Building a framework for managing identity that supports ‘zero trust’ and writing actionable playbooks
- Applying adaptive MFA to elevate trust in identities and mitigate user impersonation
- Using automation to eliminate redundancy and human errors in enhancing business processes