Cloud, Mobile & IAM

In recent years there has been a cultural shift supporting an increasingly mobile and flexible workforce enabled by technologies such as Cloud. This has not only made having a robust IAM strategy more essential but also increasingly more challenging. This theater provides tips for best practice when setting your strategy and examples of mistakes to avoid.

Cloud, Mobile & IAM Speakers

Bryan Christ
Bryan Christ

IAM Sales Engineer Hitachi ID

View

Bryan Christ
Gary Nichols
Gary Nichols

Managing Director, Security Design & Engineering Charles Schwab

View

Gary Nichols

Gary Nichols is the Managing Director of Security Design & Engineering for Charles Schwab.  He oversees information security standards, researching and recommending security technologies, security research and development, managing cloud security strategy, and establishing security designs and prescriptive architectures for the Firm.  Mr. Nichols has over 20 years of information security and information technology experience within the military, government, hospitality, telecommunications, aerospace, banking, software development and insurance sectors. 

Prior to joining Charles Schwab, Mr. Nichols was a consultant to  Honeywell Global Security, and was the Chief Information Security Officer for Blue Cross Blue Shield of Arizona.

Charles Schwab & Co. (NYSE:SCHW) is one of the world's largest investment banks and brokerage companies, managing over $3 trillion in assets. The San Francisco-based company operates more than 300 branches with around 14,0000 employees throughout the US, in London and Hong Kong.

Mark Langford
Mark Langford

Principal Consultant Aberfoyle Associates

View

Mark Langford

Mark Langford is the Founder and Principal Consultant at Aberfoyle Associates, a Plano, Texas bases cybersecurity consulting firm that helps client companies optimize their cyber defense policies, investments, and strategies to protect vital intellectual property and customer records.
 
Mark is a Board Member of the North Texas ISSA, was recently inducted into Infragard, and is called upon periodically to speak at cybersecurity industry events on ways to minimize the disruption of productivity and loss of market share due to cyber attacks. He has lived and worked in four different countries, holds a Master's Degree in Telecommunications Management from Oklahoma State University, and earned Salesman of the Year honors twice from a Fortune 100 technology company. Mark is married with three mostly-grown children, is training for a distance swimming race, and volunteers his time to Computers for the Blind, a Dallas-based non-profit organization.

Todd Bursch
Todd Bursch

Manager, Solution Architects Forcepoint

View

Todd Bursch

Cloud, Mobile & IAM Seminars

  • Wed 31th Oct 10:10 - 10:40
  • Microsoft Office 365 – Make it a Secure Journey for Digital Transformation Todd Bursch  |   Forcepoint   |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Wed 31th Oct 10:10 to 10:40

    Microsoft Office 365 – Make it a Secure Journey for Digital Transformation

    Office 365 adoption is continuing at a strong pace, and is often the corner stone for a company’s digital transformation journey.  The decision to implement Office 365 is often a top-down decision, resulting in lack of awareness in terms of security and capabilities when the platform is initially rolled out.  However, this rapid change puts pressure on departments to adapt, exposes weaknesses, and creates new security challenges as IT remodels its security posture to protect the new ecosystem.

    This session will provide insights into how only Forcepoint can secure Office 365 and all your other SaaS applications.

    Speaker

    Photo Speaker Name Profile
    Todd Bursch Todd Bursch View Profile
  • Wed 31th Oct 10:50 - 11:20
  • Adopting an Automation-First Strategy for Identity and Access Management Bryan Christ  |   Hitachi ID   |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Wed 31th Oct 10:50 to 11:20

    Adopting an Automation-First Strategy for Identity and Access Management

    Process automation within an IAM environment can be challenging. Many systems that excel at governance and certification tasks are simply not well suited for automation. Many organizations believe their requirements are simply too unique to be automated and/or their existing home grown solutions will suffice. A thorough data cleanup is often advocated for before automation technologies are deployed however this is the wrong approach as such technologies can actually help with the data cleansing effort. In this session we will explore many aspects of IAM automation and deliver concrete recommendations towards achieving the goal of identity management automation.

    Speaker

    Photo Speaker Name Profile
    Bryan Christ Bryan Christ View Profile
  • Wed 31th Oct 02:20 - 02:50
  • The Resource Dilemma: How Security Professionals Can Win the Funding Battle to Get the Resources They Need to Prepare an Adequate Cyber Defense Mark Langford  |   Aberfoyle Associates  |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Wed 31th Oct 02:20 to 02:50

    The Resource Dilemma: How Security Professionals Can Win the Funding Battle to Get the Resources They Need to Prepare an Adequate Cyber Defense

    This presentation is focused on strategies to help security professionals get the funding approval they need for additional investment in tools, external consulting support, staff training, 3rd party testing, audits, and assessments, as well as to obtain needed internal resources such as floorspace, collaboration from all employees, and more security staff.

    Speaker

    Photo Speaker Name Profile
    Mark Langford Mark Langford View Profile
  • Thu 1th Nov 02:20 - 03:30
  • Student Sessions Gary Nichols  |   Charles Schwab  |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Thu 1th Nov 02:20 to 03:30

    Speaker

    Photo Speaker Name Profile
    Gary Nichols Gary Nichols View Profile
Top