Identity & Access Management
We know how much of a necessity IAM is to a security program, however we often have difficulty convincing other departmental leaders and their teams of this. If we shift perspective, we both want to simplify and clarify access; this simplicity and fluidity is a win for them as well. Presentation Importance: If you’ve built an IAM program you know just how hard it is to figure out who needs access to what, which rogue SaaS apps your company is using (hint it’s all of them) , how many redundant apps there are and who owns which apps. In my experience having set up IAM programs from the ground up at 3 different companies in 3 different industries (non-profit, marketing, streaming) in order to get a decent picture of what software inventory you have and how the current provisioning of access works. You will need to interview at least a coordinator from each department if not someone from every team at your company.
Sean Juroviesky is a dedicated security and risk management expert with extensive experience navigating complex environments. Sean excels at developing a comprehensive understanding of intricate systems and crafting strategic roadmaps to revitalize security programs. By identifying high-risk areas and optimizing the use of existing resources, Sean removes barriers between teams to enhance communication and coordination, driving effective security outcomes. Beyond their professional pursuits, Sean finds joy in backpacking through the mountains with their adventurous Australian Shepherd and twins, embracing the serenity of nature and the thrill of exploration.
We proudly present SecretCon, an entirely unparalleled conference for the state of Minnesota, built for our new digital reality. This conference is dedicated to the many specialties of our hacker, cybersecurity, and privacy community. We have taken it upon ourselves to construct a conference that not only embraces our past, but also looks to the future. Join us!