Discounted tickets are available now!
New York Professional Events List
Identity Management & Access Control
Date
Link to Website
Organizer
Venue
Location
Ticket Price: €3780
Identity Management & Access Control – why?
Enterprises need to manage access to information and applications scattered across internal and external application systems. Moreover, they must provide this access for a growing number of identities, both inside and outside the organization, without compromising security or exposing sensitive information. Security and Identity Management & Access Control leaders often struggle with launching and sustaining Identity Management & Access Control initiatives. International Management Forum (IMF) advocates an approach to govern Identity Management & Access Control initiatives so as to manage the full spectrum of risks and achieve desirable business outcomes.
Make Identity Management & Access Control work for you!
Business demands on Identity Management & Access Control are changing rapidly, resulting in the requirement to adopt emerging technologies (e.g. mobile and cloud computing, data loss prevention, and social media) earlier and more quickly. Specifically cloud computing creates new Identity Management & Access Control risks that must be managed. Typical pitfalls include the difficulty of managing access consistently across the enterprise and the increased complexity (which also drives up the cost) of incorporating new technologies into the existing Identity Management & Access Control processes.
Effective Identity and Management processes are integral to driving business value reducing risk, sustaining compliance, improving the end user experience and responding to the changing IT landscape. Identity Management & Access Control is a critical step in the process of securing company resources, while allowing users enough access to get the job done.
Enterprises that develop mature Identity Management & Access Control capabilities can reduce their Identity Management costs significantly. Poorly controlled Identity Management & Access Control processes may lead to regulatory non-compliance, because your company will not be able to prove that company data is not at risk for being misused. To help reach the goal of an enabler that reduces risks, this 4-day Identity Management & Access Control focused training explains life cycle phases, relevant IT trends, a capability maturity model, key considerations for transformation, tools and how to get started.
Identity Management & Access Control – for what professionals is this training a must?
Are you responsible for the successful implementation of Identity Management and Access Control in your organization? Don't hesitate, this is the training you have been waiting for. This 4-day Identity Management & Access Control training is a must for identity managers, process managers, IT managers, (IT) information managers, (information) security managers, IT auditors, network managers, security architects, risk managers, compliance managers, and Human Resources managers.
Identity Management & Access Control – what is it?
Identity Management & Access Control is the discipline for managing access to enterprise resources. It is a foundational element of any information security program. Identity Management describes the management of individual principals, their authentication, authorization, and privileges within or across system and enterprise boundaries with the goal of increasing security and productivity while decreasing cost, downtime, and repetitive tasks. The terms Identity Management (IdM) and Identity & Access Management (IAM) are used interchangeably.
Identity Management covers issues such as how users gain an identity, the protection of that identity and the technologies supporting that protection (e.g. network protocols, digital certificates, passwords, etc.). Identity Management and Access Control comprises of people, processes and products to manage identities and access to resources of your enterprise. The ultimate goal of the Identity Management & Access Control framework is to provide the right people with the right access at the right time.
Identity Management & Access Control – prerequisites
The trainer expects you to have some years of working experience in the IT area or having experience with Process Management.
Identity Management & Access Control – level of the training
The training will be held on a post-bachelor level.
Identity Management & Access Control – limited number of participants
The number of training participants is limited so they may benefit from the exercises.
Identity Management & Access Control – feedback from participants
The Identity Management & Access Control training is assessed by participants with an 8 (on a scale from 1 to 10).
"Great training. Gave a good insight of what IAM is about. I could relate it to our current status quo and identity course of action for further analysis."
"The training was perfect, complete and customized."
Thierry De Brabandere, IT Security Associate Director, Coca Cola European Partners
Agenda
Now in its 11th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. You will learn about:
- Information security controls, laws, and standards
- Various types of footprinting, footprinting tools, and countermeasures
- Network scanning techniques and scanning countermeasures
- Enumeration techniques and enumeration countermeasures
- Vulnerability analysis to identify security loopholes in the target organization's network, communication infrastructure, and end systems
- System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities
- Different types of malware (Trojan viruses, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures
- Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing
- Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures
- DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures
- Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures
- Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures
- Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures
- SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures
- Wireless encryption, wireless hacking methodology, wireless hacking tools, and wi-fi security tools
- Mobile platform attack vector, Android vulnerability exploitations, and mobile security guidelines and tools
- Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures
- Cloud computing concepts (container technology, serverless computing), the working of various threats and attacks, and security techniques and tools
- Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap
- Threats to IoT and OT platforms and defending IoT and OT devices
- Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools