We've noticed this is not your region.
Redirect me to my region
What do you want to learn today?

Details

Identity Management & Access Control – why?

Enterprises need to manage access to information and applications scattered across internal and external application systems. Moreover, they must provide this access for a growing number of identities, both inside and outside the organization, without compromising security or exposing sensitive information. Security and Identity Management & Access Control leaders often struggle with launching and sustaining Identity Management & Access Control initiatives. International Management Forum (IMF) advocates an approach to govern Identity Management & Access Control initiatives so as to manage the full spectrum of risks and achieve desirable business outcomes.

Make Identity Management & Access Control work for you!

Business demands on Identity Management & Access Control are changing rapidly, resulting in the requirement to adopt emerging technologies (e.g. mobile and cloud computing, data loss prevention, and social media) earlier and more quickly. Specifically cloud computing creates new Identity Management & Access Control risks that must be managed. Typical pitfalls include the difficulty of managing access consistently across the enterprise and the increased complexity (which also drives up the cost) of incorporating new technologies into the existing Identity Management & Access Control processes.

Effective Identity and Management processes are integral to driving business value reducing risk, sustaining compliance, improving the end user experience and responding to the changing IT landscape. Identity Management & Access Control is a critical step in the process of securing company resources, while allowing users enough access to get the job done.

Enterprises that develop mature Identity Management & Access Control capabilities can reduce their Identity Management costs significantly. Poorly controlled Identity Management & Access Control processes may lead to regulatory non-compliance, because your company will not be able to prove that company data is not at risk for being misused. To help reach the goal of an enabler that reduces risks, this 4-day Identity Management & Access Control focused training explains life cycle phases, relevant IT trends, a capability maturity model, key considerations for transformation, tools and how to get started.

Identity Management & Access Control – for what professionals is this training a must?

Are you responsible for the successful implementation of Identity Management and Access Control in your organization? Don't hesitate, this is the training you have been waiting for. This 4-day Identity Management & Access Control training is a must for identity managers, process managers, IT managers, (IT) information managers, (information) security managers, IT auditors, network managers, security architects, risk managers, compliance managers, and Human Resources managers.

Outline

DAY I
Identity Management & Access Control
  • Problem statement
  • Drivers for Identity Management & Access Control
  • Business Case practice
  • Compliance
  • Identity philosophy

Authorization Management

  • Authorization
  • Authorization Management
  • Role Based Access Control (RBAC)
  • RABC practice
  • Access Governance
  • Access practice

DAY II
Identity Management

  • Identity
  • Identity Management practice
  • Identification and Authentication
  • Federated Identity Management
  • Single Sign-On (SSO)
  • Security Controls practice

Architecture

  • Sources for Identities
  • Cloud-HR-CRM
  • Reference Model
  • SABSA practice

DAY III
Trust

  • Public Key Infrastructure (PKI)
  • Federated Identity Management
  • Security Controls practice

Cloud

  • The Cloud
  • Cloud developments
  • Cloud Architecture practice
  • Trust frameworks
  • Privacy
  • Cyberwar

DAY IV
Security

  • Information Security Process Improvement (ISPI)
  • ISO2700X practice
  • Risk analysis by means of the quadrant method
  • Risk analysis - practice
  • Technical security

Implementation

  • Do's and don'ts
  • Practice
  • Repeat
  • Questions and answers

Speaker/s

A. Koot, MBA CISA CISM
André Koot is Security and IAM Lead Consultant and CyberXpert at Nixu Corporation. André is a member of the advisory board of Identity Next and member of the Cloud Expert Team of EXIN.

Special Offer

In-company

Identity Management & Access Control training in-company
With at least 5 participants it is possible to conduct this Identity Management & Access Control training in-company. Please contact us to discuss the possibilities.

The in-company Identity Management & Access Control training will be:

  • completely adapted to your organization;
  • conducted in your own working environment;
  • will save you time and money; and
  • sensitive information can be openly discussed, as there are no outsiders involved.

Schedules

Mar 25, 2024 - Apr 09, 2024
ENDED
Mon, Tue 09:00 AM — 05:00 PM
Oct 02, 2024 - Oct 10, 2024
Wed, Thu 09:00 AM — 05:00 PM
Reviews
Be the first to write a review about this course.
Write a Review
IMF Academy is an independent publisher of distance learning courses and organizer of hot topical classroom based trainings. IMF focuses on business information for managers and decision-makers in large and middle-sized companies and non-profit organizations. During the past 20 years, we gained a solid reputation by providing to-the-point and valuable information about topics both critical and of current interest.

Beside of this, we offer a lot of classroom based trainings. Topics vary from subjects in the area of Information Technology, Finance/Tax, Project Management and (IT) Security Management.

Most courses are in the Dutch language; others are published worldwide in the English language. Our courses are mainly edited by specialists working at the large international consultancy organisations like (among many others) PwC, KPMG, Deloitte, Atos Origin, IBM Business Consulting Services, Capgemini, EY (Ernst & Young), Sogeti and Transfer Pricing Associates. Our authors and trainers are all leading specialists in their field.
Sending Message
Please wait...
× × Speedycourse.com uses cookies to deliver our services. By continuing to use the site, you are agreeing to our use of cookies, Privacy Policy, and our Terms & Conditions.