Identity Management Webinars

Preventing Business Email Compromise

Preventing Business Email Compromise

Business Email Compromise is a form of cybercrime where an attacker gains control of a victim’s business email account and imitates their identity to defraud the company and its employees. It is usually a spear phishing attempt where the top executive is targeted, and the organization’s data is exploited.

iam assessments define your path to success

How IAM Assessments Define Your Path to Success

In this webinar, you will learn how an IAM Assessment and Solution Roadmap can help your organization effectively plan for change so you can achieve ongoing excellence with your IAM program.

learning about policy based access control (pbac)

Learning about Policy Based Access Control (PBAC)

In this webinar, Ron Bowron (Idenhaus) and Mike Morley (PlainID) walk through the basics of Policy Based Access Control. PBAC offers an advanced framework to centrally manage permissions and provide assurance for the enterprise in a scalable solution. 

Unlocking the Benefits of an Identity Management (IAM) Roadmap Webinar

Unlocking the Benefits of an Identity Management (IAM) Roadmap

Learn how to evaluate the needs of your organization (people, process, technology) and the steps you can take to build a comprehensive, convincing IAM Roadmap to guide your IAM program from concept to reality. 

 

identity automation or governance

Which Comes First: Identity Automation or Governance?

When getting started with IAM, companies will need to decide whether to begin with automation or governance first. This webinar explores both approaches and makes a case for which should come first.

secure funding for your identity management program

How To Secure Funding for your Identity Management Program

In this webinar, Hanno Ekdahl, Founder of Idenhaus Consulting, walks through the essentials of the ‘fundraising process’. If you are interested in securing IAM funding, this webinar is a great opportunity to get an experienced perspective.

Identity Management-Role Based Access Control Best Practices

Identity Management: Role Based Access Control Best Practices

Organizations undertake RBAC projects to provide a better user experience and to dramatically improve their security posture. In this webinar, you will learn role based access control best practices that will reduce delivery risk and allow you to deliver more value to the business.

GDPR-First-Year-in-Review-and-Sneak-Peak-to-the-Year-Ahead

GDPR: Year 1 in Review and Sneak Peak to Year Ahead

GDPR swept the globe last after its debut in May 2018. It changed how organizations market, conduct business, process data, and created numerous new cookie banners! As GDPR celebrates its first birthday, what are the relevant lessons that businesses should learn from?

 

How-to-Effectively-Use-Role-Based-Access-Control-in-the-Real-World

How to Effectively Use Role-Based Access Control in the Real World

Join Idenhaus as we share lessons learned from Role Based Access Control (RBAC) implementations to help you keep your RBAC project on track. You will learn how to balance managing the complexity of RBAC and delivering value to the business effectively. 

 

Successfully-Integrating-HR-Processes-with-Identity-Management

Successfully Integrating HR Processes with IAM

Integrating HR processes with IAM can be complicated, involving people, processes, and technology across the entire business. Join Hanno Ekdahl, founder of Idenhaus Consulting, to learn how to successfully integrate HR processes. 

Identity-Management-Overcoming-Data-Quality-Challenges

Overcoming Data Quality Challenges in IAM

During this webinar, we walk through mini-case studies that showcase common data quality challenges, identify root causes, and provide recommendations to improve data quality and drive new results from your existing IAM systems.

 

Identity-and-Access-Management-Project-Challenges-&-Recovery-Webinar-Idenhaus

Identity and Access Management: Project Challenges and Recovery

This educational session provides a high-level overview of core Identity Management functionality. It introduces concepts such as provisioning, self-service, business workflow integration, and resource connection.

Scroll to Top