Tap into the power of access assurance

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Access assurance may be a complex area, but Stuart Hodkinson, UK general manager with Courion Corporation - along with Fran Howarth, a principal analyst with Quocirca - has more than a few answers in this educational and informative webinar.

The event - which also allows attendees to download a free white paper on the subject at hand - reveals that access assurance may be complex but, if broken down into specific areas, it can be tackled in all organisations.

In the webinar, you'll hear how a define-apply-validate approach is often the key to the success of access assurance, and companies also need to confirm and validate users on the systems in order to develop an effective service.

Some IAM projects are too lage to be effective, and this is where breaking down the project into its constituent parts can often pay dividends.

"You need to create a road map - select a solution, rather than a product, and it can often pay to fix price the solution," says Hodkinson.

"If you then prioritise the activities, you can succeed in deploying an optimal solution," he adds.

Join us for this entertaining and informative webinar in which we will:

  • Explain how access governance and compliance play a central role to an organisation's IT security
  • Look at how it is possible to stay within budget and still maximise your access assurance resources
  • Help you understand how access assurance can be central to your IT security systems and help prevent data leaks and losses.

This webinar is for:

  • IT security managers looking to further their knowledge of access assurance
  • IT professionals wanting to know more about how to stop data leaks and losses
  • Anyone wanting to bring themselves up to speed on the latest access governance and compliance.

Speakers

Steve Gold

Infosecurity Magazine

Stuart Hodkinson

General Manager, UK Operations, Courion Corp.

Photo of Fran Howarth

Fran Howarth

Snr Analyst, Security, Bloor Research

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.