Identity and Access Management Fundamentals
Published by O'Reilly Media, Inc.
Securing your data for a zero trust environment
Course outcomes
- IAM status assessment
- Successful IAM program implementation
Course description
Identity and access management (IAM) is a fundamental cybersecurity capability that ensures the right users have access to the right resources at the right time for the right business outcomes. Here’s a hard truth: If an attacker has valid credentials, all the patches and firewalls in the world won’t keep them out. Identity is the ultimate attack surface and the new control plane.
Join expert Harpreet Kohli to explore identity and access management (IAM) concepts and components, key challenges, and an action plan to build an IAM strategy and road map. You’ll gain a solid understanding of how IAM strategy, technology, and processes work together to build an IAM capability in an organization. Plus, if you’re preparing for the CISSP or CISM certification exams, IAM should be a part of your study plan.
What you’ll learn and how you can apply it
- Explore the problems IAM can solve
- Understand the core components of IAM, including IGA, PAM, and access management
- Learn about IAM use cases
- Create an action plan to build or update your IAM strategy and road map
- Understand the dos and don’ts of building a robust IAM program that’s aligned to business objectives
This live event is for you because...
- You’re a cybersecurity or IT professional tasked with maintaining an IAM program.
- You’re a cybersecurity decision maker looking to design and implement an IAM program.
- You’re a technology and business consultant acting as a liaison with cybersecurity teams.
Prerequisites
- A basic understanding of IT, security, and business concerns
Recommended follow-up:
- Read Learning Digital Identity (book)
- Read Identity and Access Management (book)
- Read Identity Attack Vectors (book)
Schedule
The time frames are only estimates and may vary according to how the class is progressing.
An introduction to IAM (60 minutes)
- Presentation: Current threat landscape and need for a robust IAM; use cases
- Hands-on exercise: Quiz
- Q&A
IAM capabilities and overview (60 minutes)
- Presentation: Identity governance and administration; privileged access management; access management
- Hands-on exercise: Quiz
- Q&A
IAM program (55 minutes)
- Presentation: Key challenges with IAM program; dos and don’ts and action plan for establishing a successful IAM program; the secure by design approach
- Hands-on exercise: Quiz
- Group discussion: AI as a double-edged sword—balancing innovation and risk in IAM
Wrap-up and Q&A (5 minutes)
Your Instructor
Harpreet Kohli
Harpreet Kohli is a cybersecurity leader with extensive experience building cybersecurity programs in various organizations, at both strategic and tactical levels. She’s helped organizations understand the impact of future technologies on their security landscape and view security risks and control strategies holistically. Harpreet serves as a member of the ISO/IEC Standards Council of Canada and holds multiple security certifications, including CISSP, CISM, CISA, and SABSA Chartered Security Architect. She has master’s degrees in both electronics engineering and information systems security management. To share her knowledge and experience with budding security professionals, she teaches master’s courses within the Information Systems Security Program at Concordia University.