20/20 Vision: Identity and Access For The Next Decade

20_20 banner Dallas

As attacks become more difficult to detect and defend, and threats
continue to grow, no organization is immune from security breaches.
We anticipate a shift around identity and access management (IAM) as
enterprises cope with increased regulatory compliance requirements,
insider and external threats, cloud integration, and more.

IBM Security threat aware IAM solutions help prepare you for current and
future security challenges with identity intelligence and secure online
access in mobile, cloud, mainframe, and social environments.

Explore IBM Security identity and access management
Join IBM and Pathmaker Group and learn how to:
• Use security intelligence to improve user oversight and compliance.
• Respond effectively to the rising number of identity focused attacks.
• Safeguard access within mobile, cloud, mainframe and social
environments.
• Protect against advanced insider threats.
Don’t miss this chance to network with your peers, talk to IBM security
experts, and get practical advice for your own IAM environment.

Space is limited, so please reserve your seat today.

agenda

 

Gartner Identity and Access Management Summit

How Can a Company Guarantee a Successful, Strategic Identity Access Management Program?

The Gartner Identity and Access Management Summit is right around the corner and leaders from all over the world will be coming to try to get this question answered.  Here are a few ideas from our ten years in the industry.

Strategic Identity and Access Management (“IAM”) projects can be difficult and the new challenges with mobile, social, and cloud compound the problem.  Protecting the perimeter is not enough anymore.  Safeguarding identities are the key to a truly secure enterprise.

The industry has seen way too many train wrecks with IAM.  To get beyond basic capabilities and really use IAM systems as a foundation for strategic IT, a company MUST take the time up front to consider the long-term plan.  Near-term, immediate priorities can be solved with client-based single sign-on, basic provisioning, simple roles and audit reports.  But with a short-term (and maybe short sighted) plan, a company can just as easily limit their ability to solve more complex problems.

Read more

Application Security Webinar

 Presented By:

  • Tony Vera, Senior Certified Security Specialist at IBM.
  • Ryker Exum, Information Security Consultant at PathMaker Group
  • Jason Bellomy, Manager of North American Sales for IBM’s Application Security Segment

In this 50 minute webinar you will:

  • Learn about the top security vulnerabilities that have yet to be addressed
  • See common live hacking scenarios
  • Hear about the current trends in mobile app security
  • Learn how to get a free security assessment for your company

About the key presenter, Tony Vera:

Tony is a Senior Certified Security Specialist at IBM. Since joining IBM in 1995 Mr. Vera has worked as a technical professional, with a wide range of clients in all aspects of the software engineering lifecycle. This work requires skills in the areas of product technical competencies, training, project management, contemporary software engineering technologies, and most recently, application security.

About Ryker Exum:

Ryker is an information security consultant with the Dallas, Texas based consulting firm PathMaker Group. He received his MBA and a graduate certificate from the NSA accredited, University of Dallas Information Assurance program. He holds several professional security certifications including CISSP, OSWP, CEH, and SSCP.

About Jason Bellomy:

Jason manages North American Sales for IBM’s Application Security segment. For 3.5 years he has led the Application Security Sales Team and helped integrate two IBM acquisitions, Watchfire and Ounce Labs, that make up the current IBM Application Security Portfolio.

Oracle OpenWorld 2012!

We are very excited about the opportunity to connect with customers and partners at Oracle’s most important educational and networking event of the year. You can find us at booth #3928 Moscone West where we will be available to discuss how PathMaker Group is leveraging Oracle’s product suite to serve our customers’ needs across a variety of industries.

And a few cool giveaways don’t hurt either!

Giveaways include:
Flying Monkeys
iPhone coffee mug 4/4s Cases
Balsa Airplane Gliders
Survival Kits

PathMaker Group is coming to Oracle OpenWorld 2012!

Register Now

We are very excited about the opportunity to connect with customers and partners at Oracle’s most important educational and networking event of the year. You can find us at booth #3928 Moscone West where we will be available to discuss how PathMaker Group is leveraging Oracle’s product suite to serve our customers’ needs across a variety of industries.

Come by to see and touch a live Oracle 11g Identity Management demo at our booth.  The demo will leverage an environment built and hosted in the cloud to show some key product functionality that addresses many common uses cases and pain points.  This functionality includes:

  • OAAM Login with Security Image and Phrase
  • Authentication using a One-Time Password via SMS
  • OAAM Trigger Fraud Policy Cases – KBA, Open Case, & Block Access
  • OIM Self-Registration
  • OIM Custom Workflow & Approvals
  • Policy Based Automated Provisioning & De-Provisioning
  • Advanced OIM,OAM,OAAM Integration Read more