Identity and Entitlement Management

Identity and Entitlement Management

Towards Effective Identity Management, Services and Controls

23 October 2008 (14-21)
Location: Pullman Diegem (Diegem)
Presented in English
Price: 590 EUR (excl. 21% VAT)

This event is history, please check out the List of Upcoming Seminars, or send us an email

Check out our related in-house workshops:

Why do we organize this seminar ?

Identity & Access Management (IAM) has become a very unclear topic in the market these days. Many organizations, many stakeholders, and many suppliers & vendors understand very different things under the term IAM, so it is no wonder that 2 out of 3 IAM-projects fail. This seminar wants to give you a clear overview and understanding of this complex, but for most organizations quite essential solution to security, compliancy and risk management.

This seminar intends to:

  • Give you a clear picture of what identity (and access) management can mean for you and what the different components of such an environment are.
  • Make you understand which technical advantages and optimizations it can deliver, but also which business cases can justify the necessary (and often significant) budgets.
  • Show you how IAM can be used to support your business in the context of B2E, B2C, B2B, G2C, G2G, G2B, ...
  • Help you understand how to position identity management as a service within your enterprise architecture and how ERP, CRM and other systems can be integrated with it
  • Explain you how IAM can help you to get into control and improve compliance with SOX, Basel II, AEO and others
  • Give you an overall view on the actual situation with regards to Governance, Risk and Compliance (GRC).

The newest trend in IAM is called "entitlement management", which goes one step beyond authentication, leading to finer-grained access control. While authentication is about who is allowed on your network or in your application, entitlement management is about who is allowed to do what. Traditionally, such entitlements have been built into each of the applications your enterprise has. The new strategy is to remove access management from the applications, and to run it as a centralised shared service. Entitlement management can be used to strengthen the security of Web services, Web applications, legacy applications, documents and files, and physical security systems. This will lead to tighter, more granular security that is more specific to your set of users and their roles, easier to enforce and change policies, as well as better auditability and compliance.

Who should attend this seminar ?

This seminar wil help you to find your way in the IAM-jungle, to understand the issues to reckon with, and to bring your project/program towards a success. Therefore this seminar should be attended by:

  • Business managers needing to understand and ask the correct questions
  • B2B/B2C-project-leaders wanting a global picture and understand the issues
  • Auditors / Governance wanting/needing to obtain assurance
  • IT managers and Architects in search of a reality check


Questions about this ? Interested but you can't attend ? Send us an email !