March 2, 2016 By Nick Oropall 2 min read

Oftentimes, identity and access management (IAM) can be viewed as simply an administrative tool, an audit tool or a check box within an organization. At the Gartner Identity & Access Management Summit in London, IBM plans on changing that viewpoint.

In the current environment of insider threats, inadvertent actors and malicious outsiders, it is more important than ever to understand who your users are and what they have access to. Not knowing the answers to these questions could have serious security implications and, more importantly, business implications.

The Importance of Understanding Access

Who has access to emissions testing information? Who has access to fantasy football lineup information? Who has access to a politician’s email server? Each of these may not seem critically important, but knowing this information can be the difference between a lawsuit, a security breach, stolen information, money loss or a typical no-news day within the organization.

Consider when a bank accepts money, pays out money, transfers money or moves it in any way. The bank knows exactly who has access, when/where they interacted with the money and what exactly they are allowed to do once they have that access.

Data, in many cases, may be even more valuable than money, yet we treat it differently. Patient information, customer financial information, secret recipes, algorithms and any other crown jewels must be protected at all costs, and therefore, it is critical to understand who has access and what they can do once they have that access.

Download the latest Identity and Access Management Buyer’s Guide

Gartner and IBM Spread Intelligence

If it is so critical to secure the organization with IAM, then how do we do it? Major themes IBM will be presenting and discussing at the upcoming summit include the insider threat, identity and access management in the cloud, identity governance and intelligence and access management.

These themes will be discussed at a session titled “Why Identity Must Be Your First Security Control,” presented by IBM’s Jason Keenaghan, program director for IAM Offering Management. Most data breaches begin with bad actors stealing legitimate user credentials. By locking down user identities, you can protect your organization against stolen credentials and the insider threat. Attendees of this session will learn how IBM’s approach to IAM can make the organization more secure.

The Gartner IAM Summit in London is always an excellent event with a wide variety of customers, vendors and business partners present. If you are interested in learning about the key trends in identity and access management, hearing from your peers or telling your IAM story, I highly recommend attending the event. Don’t forget to stop by the IBM session and booth.

Since we are in the U.K. and IBM is a major Wimbledon sponsor — we even collect and analyze match data — we will have an interactive Wimbledon game where participants can win prizes. We look forward to seeing you there!

More from Identity & Access

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

From federation to fabric: IAM’s evolution

15 min read - In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that process (technically possible, not always advisable). But what is the next step in our evolution towards greater interoperability between our applications, services and systems?Identity and…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today