Experts Weigh In on the Future of IAM

Identity-Centric Security

We’ve invited a panel of cybersecurity leaders to address the critical importance of a holistic approach to Identity Access Management (IAM) for highly regulated sectors such as healthcare and the financial sectors.

Take this opportunity to hear from experts and participate in an engaging Q&A session after the discussion.

Today’s organizations face complex security requirements. From managing identities, privileges, and data access essential to safeguarding sensitive information, to maintaining compliance with regulations like GDPR, HIPAA, and SOX, a highly customized IAM program is necessary for top-tier cybersecurity as well as business growth.

This panel will discuss strategies for integrating IAM into existing infrastructures, leveraging emerging technologies like AI and machine learning, and balancing security with user convenience. Attendees will learn how to achieve seamless access control while mitigating risks such as data breaches, insider threats, and identity fraud.

Key takeaways include:

  1. Understanding Regulatory Demands:
    Explore how compliance frameworks shape IAM requirements and how to meet these demands effectively.
  2. Holistic Approach to IAM:
    Panelists will explain how to unify IAM strategies across access management, identity governance, and privileged access management to create a secure and scalable environment.
  3. AI and Automation in IAM:
    Discover how AI, machine learning, and automation tools can enhance IAM by providing intelligent access decisions, real-time monitoring, and rapid threat detection.
  4. Zero Trust and Beyond:
    Discussion on the importance of implementing Zero Trust architectures to ensure only the right people have access to the right data at the right time, particularly in highly regulated industries.
  5. IAM Best Practices for Highly Regulated Industries:
    Real-world examples and case studies demonstrating successful IAM implementations, as well as insights on how to avoid common pitfalls and ensure long-term compliance.
  6. Privileged Access Management (PAM):
    A deep dive into managing privileged access across the organization to prevent data breaches, reduce insider threats, and maintain auditability in highly regulated environments.

SUBMIT FORM FOR THE IAM PANEL PRESENTATION ACCESS

Panelist of Experts 

Greg Shanton Headshot

Greg Shanton

Vice President of Cybersecurity

Greg is the Vice President of Cybersecurity for Neovera, leading the cybersecurity professional services, security monitoring, and management services for Neovera, providing services to both commercial and government clients. Before joining Neovera, Greg served in various capacities at CA Technologies - as Senior Vice President of CA's professional services North American and Global Practices units, Vice President of the Identity and Access Management practice, and the global lead for CA's Cloud Security (Secure Cloud) partner program. Clients include both the public and private sectors.

Nestor Morejon Headshot

Nestor Morejon

Senior Enterprise Security Architect

Nestor has over 30 years of IT experience, from product development to full-scale, worldwide, complex enterprise deployments. Specializing in cybersecurity for most of his career, he has worked as a CISO, a consultant, and an SVP, Distinguished Engineer at CA Technologies. Nestor is a thought leader in the industry, conference speaker, and trusted advisor to many C-level executives of some of the largest organizations and government entities in the world. He has developed architecture requirements & deployment methodologies, compliance assessment & remediations, and has been key in major enterprise transformation projects.

thumbnail_Paul Underwood Picture

Paul Underwood

VP of Cybersecurity

Paul Underwood is the Vice President of Cybersecurity at Neovera. Paul has over 30 years of experience working in the Information Security space including 8 years with the US Air Force. Paul was a principal at Digital Signature Trust back in the 90’s working on Public Key Cryptography utilizing Hardware Security Modules to create Root certificates for the Browsers for trusted Root Certificates including the first Entrust Root Certificate to be published in a browser. His experiences have led him to be a knowledgeable and experienced Trusted Security advisor for many fortune 500 customers over the years.

JJohnson headshot

Jeremy Johnson

Senior Director

Jeremy currently serves as Senior Director at Neovera’s Kansas City location. He has over 20 years of cybersecurity experience, both managing and in performing penetration testing, IT audits, and other technical assessments.  He has completed hundreds of security engagements, for clients throughout the US.  Prior to 10-D he performed network administration and support in a variety of environments and leverages this experience to help clients find real-world solutions to keep their networks and data secure.  Mr. Johnson is an Offensive Security Certified Professional (OSCP) and a Certified Information Systems Security Professional (CISSP).