Agenda Details

G7 Role-Based Access Control: A Method that Works
Clint Elston, CISSP, IS Compliance Specialist, Integris-Health
Date: Tuesday, 16 April 2013
Time: 4pm - 5pm
• When you have more exceptions than roles, what's the point?
• Understanding the difference between Identity Governance and Identity Management
• How using Identity Governance as a driver to RBAC may be initially slower but ultimately more successful
• How role mining leads to the ability to recognize and create meaningful roles
• Recognizing the power of a hybrid top down/bottom up role mining approach