Attend Track 2 Access control, role design and segregation of duties: Automated role building for successful identity access management or compliant user provisioning projects" at GRC2015 in Nice on Tue. June 16th, 2015 from 14:00 to 15:15
Automated role building: The basics for successful identity access management or compliant user provisioning projects
Meta Hoetjes, CSI tools, Tue.. June 16th 2015 from 14:00 to 15:15
The role design is critical for successful identity access management or compliant user provisioning projects. To have an effective identity access management or compliant user provisioning your roles should be optimal.
Organisations that implement IdM or compliant user provisioning often get strange results during a request. This session offers insight into how this is caused and how this can be solved. By attending, you’ll learn:
- How to define and maintain roles with correct authorisations and aligned with business documentation
- How to check on deviations between master vs. derived roles and roles vs. role documentation
- Which analyses must be done to get correct audit reports and how to do an effective analysis
Shall we meet you there? Join us at booth #1030
The GRC 2015 conference is co-located with Financials 2015, BI 2015, HANA2015, and HR 2015. Registration at one conference admits you to all five at no additional cost.