How to Develop an Effective Identity and Access Management Strategy

  • Training Date:
  • Training Time:

Password management, user access and security are not what they used to be. Today’s IT reality is much more complex with various platforms requiring different authentication, different regulatory regimes, and of course, budget and IT department constraints. These complexities are not going away, and as new technologies emerge that require new platforms and passwords, federal agencies need an effective identity and acceess management (IAM) strategy that removes hte burden from your IT help desk.

So, what are the necessary components of an effective and holistic IAM strategy? Where should federal agencies begin? Join this on-demand training as we discuss:

  • Results from a recent GovLoop survey of over 250 public sector professionals on current security and identity management challenges.
  • The importance of a comprehensive and automated user management governance tool to improve IT efficiency and user productivity.
  • Best practices to help improve your identity management system to ensure better security, efficiency and compliance.
  • How Dell and Four Points help you create and execute a coordinated IAM strategy that frees up your help desk.
  • Lessons learned of what works and what doesn’t from specific organizations that are implementing effective IAM systems.

The risks associated with poor governance of user identities and access privileges at government agencies are high. Join this on-demand training to learn from government and industry experts how best to protect your agency.

Speakers include:

Ashley Stevenson, Chief Architect; Identity, Credential & Access Management (ICAM), DHS

Dan Conrad, Identity and Access Management Specialist, Dell

Hannah Moss, Research Analyst, GovLoop

Want more info? Read the event recap here and check out our top 3 resources from the training: