Identity & Access Management

Getting non-technical teams excited about IAM!

We know how much of a necessity IAM is to a security program, however we often have difficulty convincing other departmental leaders and their teams of this. If we shift perspective, we both want to simplify and clarify access; this simplicity and fluidity is a win for them as well. Presentation Importance: If you’ve built an IAM program you know just how hard it is to figure out who needs access to what, which rogue SaaS apps your company is using (hint it’s all of them) , how many redundant apps there are and who owns which apps. In my experience having set up IAM programs from the ground up at 3 different companies in 3 different industries (non-profit, marketing, streaming) in order to get a decent picture of what software inventory you have and how the current provisioning of access works. You will need to interview at least a coordinator from each department if not someone from every team at your company.

Sean Juroviesky

Sean Juroviesky

Sean Juroviesky is a dedicated security and risk management expert with extensive experience navigating complex environments. Sean excels at developing a comprehensive understanding of intricate systems and crafting strategic roadmaps to revitalize security programs. By identifying high-risk areas and optimizing the use of existing resources, Sean removes barriers between teams to enhance communication and coordination, driving effective security outcomes. Beyond their professional pursuits, Sean finds joy in backpacking through the mountains with their adventurous Australian Shepherd and twins, embracing the serenity of nature and the thrill of exploration.

Identity & Access Management

Heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

Getting non-technical teams excited about IAM!

We know how much of a necessity IAM is to a security program, however we often have difficulty convincing other departmental leaders and their teams of this. If we shift perspective, we both want to simplify and clarify access; this simplicity and fluidity is a win for them as well. Presentation Importance: If you’ve built an IAM program you know just how hard it is to figure out who needs access to what, which rogue SaaS apps your company is using (hint it’s all of them) , how many redundant apps there are and who owns which apps. In my experience having set up IAM programs from the ground up at 3 different companies in 3 different industries (non-profit, marketing, streaming) in order to get a decent picture of what software inventory you have and how the current provisioning of access works. You will need to interview at least a coordinator from each department if not someone from every team at your company.

You'll wish you went sooner!

We proudly present SecretCon, an entirely unparalleled conference for the state of Minnesota, built for our new digital reality. This conference is dedicated to the many specialties of our hacker, cybersecurity, and privacy community. We have taken it upon ourselves to construct a conference that not only embraces our past, but also looks to the future. Join us!