Bridging Security and Identity Management

Wednesday, February 13 | 2:15PM–3:15PM | Palm A/D
Session Type: Professional Development
Effective security efforts are composed of a complex set of interrelated components including policies, procedures, and technical controls. The interrelation between components is not obvious, and the technical details of security systems can obscure perspective with respect to other critical systems. Security architectures provide a coherent plan to ensure that we meet our IT security goals. But you can't build your security model without an accompanying IAM model as a part of it. This session will discuss models for security and IAM and how they interleave.


  • Jack Suess

    Vice President of IT & CIO, University of Maryland, Baltimore County

Resources & Downloads