Agenda Details
| G7 Role-Based Access Control: A Method that Works |
| Clint Elston, CISSP, IS Compliance Specialist, Integris-Health |
|
Date: Tuesday, 16 April 2013 Time: 4pm - 5pm |
|
When you have more exceptions than roles, what's the point? Understanding the difference between Identity Governance and Identity Management How using Identity Governance as a driver to RBAC may be initially slower but ultimately more successful How role mining leads to the ability to recognize and create meaningful roles Recognizing the power of a hybrid top down/bottom up role mining approach |