If the handout download links from within past event articles are broken, please navigate to Chapter->Downloads to obtain the document.

2011 November - Creating an End-to-End Identity Management Architecture

The Board of Directors of the ISACA Research Triangle Chapter is proud to announce the November 2, 2011 training session.

Dates: November 2, 2011 1:00 p.m. to 4:30 p.m.

Material: Identity Management Architecture

Registration: Through our website

Location: RTI Building 08 Multipurpose Room, RTI International

Fees:

ISACA Member - Free
ISACA Partners(IIA, ISSA, Infragard etc.,) - $25
Non-Members - $40

CPEs: Upto 3

 

Session: Creating an End-to-End Identity Management Architecture

One of the most important aspects of IT security is identity management. Controlling who has access to what, when and where is harder than ever as traditional perimeter boundaries soften and employee turnover increases. Single sign-on, LDAP, meta-directories, virtual directories, automated provisioning/de-provisioning of user accounts and privileges and role management all contribute to a larger solution whose importance continues to increase in the face of rising threats and stepped up regulatory requirements. This session will introduce the various components needed to cover identity and access management across the organization, present alternative architectural approaches and discuss some of the hot topics in this increasingly important space.

Speaker: Jeff Crume, Distinguished Engineer, IT Security Architect, IBM
Jeff Crume is an IBM Distinguished Engineer and IT Security Architect with 28 years experience in the IT industry. He is the author of a book entitled "Inside Internet Security: What Hackers Don't Want You To Know" and has written articles on cryptography, virtual private networking and identity management. He holds CISSP and ISSAP security industry certifications as well as Distinguished Chief IT Architect credentials from The Open Group. Jeff lived in Beijing on assignment in 2006 where he helped architect secure infrastructures for clients in the Greater China geography. He is a member of the IBM Academy of Technology and serves on the NC State University Computer Science Strategic Advisory Board, the "Information Management & Computer Security" research journal editorial board and has worked with clients in 40 countries across 6 continents.