Identity & Access Management
We know how much of a necessity IAM is to a security program, however we often have difficulty convincing other departmental leaders and their teams of this. If we shift perspective, we both want to simplify and clarify access; this simplicity and fluidity is a win for them as well. Presentation Importance: If you’ve built an IAM program you know just how hard it is to figure out who needs access to what, which rogue SaaS apps your company is using (hint it’s all of them) , how many redundant apps there are and who owns which apps. In my experience having set up IAM programs from the ground up at 3 different companies in 3 different industries (non-profit, marketing, streaming) in order to get a decent picture of what software inventory you have and how the current provisioning of access works. You will need to interview at least a coordinator from each department if not someone from every team at your company.
Sean Juroviesky is a passionate advocate for security and risk management. Sean has many years of experience delving into complex environments, building a holistic understanding of them and plotting a course forward to reinvigorate Security Programs, find high risk areas to prioritize, and find efficiency to better utilize existing resources, removing barriers between teams to drive better communication and coordination. Outside of the security world Sean is a driven twin father, a dog dad to an eighty pound Australian Shepherd Husky mix, and backpacker hiking back-country trails all across the country; from the Green Mountains, to the Cascades.
We proudly present SecretCon, an entirely unparalleled conference for the state of Minnesota, built for our new digital reality. This conference is dedicated to the many specialties of our hacker, cybersecurity, and privacy community. We have taken it upon ourselves to construct a conference that not only embraces our past, but also looks to the future. Join us!