Identity & Access Management

Getting non-technical teams excited about IAM!

We know how much of a necessity IAM is to a security program, however we often have difficulty convincing other departmental leaders and their teams of this. If we shift perspective, we both want to simplify and clarify access; this simplicity and fluidity is a win for them as well. Presentation Importance: If you’ve built an IAM program you know just how hard it is to figure out who needs access to what, which rogue SaaS apps your company is using (hint it’s all of them) , how many redundant apps there are and who owns which apps. In my experience having set up IAM programs from the ground up at 3 different companies in 3 different industries (non-profit, marketing, streaming) in order to get a decent picture of what software inventory you have and how the current provisioning of access works. You will need to interview at least a coordinator from each department if not someone from every team at your company.

Sean Juroviesky

Sean Juroviesky

Sean Juroviesky is a passionate advocate for security and risk management. Sean has many years of experience delving into complex environments, building a holistic understanding of them and plotting a course forward to reinvigorate Security Programs, find high risk areas to prioritize, and find efficiency to better utilize existing resources, removing barriers between teams to drive better communication and coordination. Outside of the security world Sean is a driven twin father, a dog dad to an eighty pound Australian Shepherd Husky mix, and backpacker hiking back-country trails all across the country; from the Green Mountains, to the Cascades.

Identity & Access Management

Heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

Getting non-technical teams excited about IAM!

We know how much of a necessity IAM is to a security program, however we often have difficulty convincing other departmental leaders and their teams of this. If we shift perspective, we both want to simplify and clarify access; this simplicity and fluidity is a win for them as well. Presentation Importance: If you’ve built an IAM program you know just how hard it is to figure out who needs access to what, which rogue SaaS apps your company is using (hint it’s all of them) , how many redundant apps there are and who owns which apps. In my experience having set up IAM programs from the ground up at 3 different companies in 3 different industries (non-profit, marketing, streaming) in order to get a decent picture of what software inventory you have and how the current provisioning of access works. You will need to interview at least a coordinator from each department if not someone from every team at your company.

You'll wish you went sooner!

We proudly present SecretCon, an entirely unparalleled conference for the state of Minnesota, built for our new digital reality. This conference is dedicated to the many specialties of our hacker, cybersecurity, and privacy community. We have taken it upon ourselves to construct a conference that not only embraces our past, but also looks to the future. Join us!