WEBCAST

Why IAM and SOD are critical to building a secure access management system

Webcast overview

It’s no longer a matter of if, it’s more likely a matter of when your organization will become a target of a cybercrime. The culprit may be a foreign or domestic hacker, a disgruntled employee or contractor, or even an unhappy customer or social activist.

Many organizations add on one or more cyber-protection software programs, or they may tweak their security processes to shore up their cyber defenses. But what is often overlooked is the need to have the access management and separation of duties policies work together to create a holistic cyber security process that is seamless, cohesive, and evolving.

KPMG invites you to join a roundtable discussion with our GRC Application and Cyber Security professionals, discussing what it means to have a complete Identity Access Management (IAM) strategy that supports not only operational effectiveness and cyber protection, but also enhancing user experience and reducing overall cost of compliance.

Featured Speakers

Christian Leva

Christian Leva

Managing Director, GRC Technology, KPMG LLP

Joseph Franczkowski

Joseph Franczkowski

Advisory Managing Director, GRC Technology, KPMG US

Adam White

Adam White

Director, Cyber Security Services, KPMG LLP