IGA for the Digital Era (Back-Office Capabilities)
Combined Session
Wednesday, May 07, 2025 11:00—12:00
Location: A 03-04
Wednesday, May 07, 2025 11:00—12:00
Location: A 03-04
One of the fundamental issues in promoting IGA program is showing the value for business, C-level leadership and board of directors. One of the measured metrics of every organization is operations efficiency centered around business task executions. Performing the task requires set of permissions and sequence of actions allowed by these permissions.
In this session, we will introduce the new approach of building IGA program business by presenting task-based identity governance, i.e. access controls around tasks in hands. We will discuss the models, formulas and suggestions how to implement this approach in your current day-to-day IAM/IGA operations along with use case examples. We will discuss discovering gaps in business needs definitions around entitlements (NPR report), complex IDT (identity (human and NHI)-devices-target) paths illustrating task workflow process, USA (update-simulate-analyze) methodology of preparation for task execution and fulfillment (Zero Standing Privileges). We will also show advantages of switching to task-based provisioning vs. typical access request process from cost and risk standpoint.
All of the above will create a real business value for your IGA program and help you with getting more recognition in your organization.
This session explores the critical stages that follow the procurement process, focusing on how to effectively deploy, integrate, and optimize your IGA solution to drive tangible results. From defining a robust implementation strategy to making key decisions on system integration, customization, and stakeholder engagement, we will cover essential considerations to ensure a smooth, scalable, and successful IGA deployment. Attendees will gain actionable insights, practical tools, and proven methodologies to navigate the complexities of the implementation phase and set the foundation for long-term success.
Over the past decade, technology transformation has been significant, particularly in the realm of Identity. What was once straightforward identity and access management, focused on application access governance, has now evolved into complex layers that influence how customers interact with an organization's products. For instance, identity now plays a crucial role in enhancing user experience and driving more foot traffic to stores or contributing to more around digital trust. While these transformations have highlighted the importance of Identity Governance and Administration (IGA) capabilities, they have also impacted and reshaped the enterprise risk landscape. Unfortunately, this area still lags behind, as many organizations fail to incorporate these considerations into their large-scale identity programs and thus IGA transformation programs and GRC as functions still run in silos.