As Identity and Access Management (IAM) continues to span both on-premise and cloud-based systems; it has become more and more of a necessity to build a hybrid approach of governance with robust IAM in mind.'so, we ask where are my organization's identities stored and how do we protect them? 'Identity and access management systems represent a treasure trove from many attack vectors; therefore, providing a valuable opportunity for evaluators to better secure the information technology ecosystem. 'In this presentation, let us explore the value and principles of IAM, opportunities for evaluating IAM from an auditing point of view, and how we can all share the responsibility for protecting our identities. '
Speaker
Chris Edmundson
Chris Edmundson has been employed in the information technology arena for over 25 years, working in a wide variety of roles, primarily in the public sector related to administration of K-12 public schools and at higher education institutions. He currently leads the enterprise architecture and application administration for the Middleware, Identity and Access Management efforts at the University of Colorado Denver | Anschutz Medical Campus. He was previously the Information Security Officer at the Colorado Department of Education where he was involved with managing and implementing security practices for approximately 10 years.