Presented at
BSidesDC 2019,
Oct. 27, 2019, 1:30 p.m.
(50 minutes).
Identity and Access Management (IAM) can be used to design and implement defensive policies and mechanisms to harden the security of the enterprise. As a byproduct, it can also model risk from privileged or sensitive accounts or applications. This talk will describe some of the issues and solutions found during various implementations.
Presenters:
-
Egdares Futch
- IT Security Specialist at Inter-American Development Bank
Egdares Futch moved recently to Washington, DC.
He was previously working in Honduras as Regional Cloud IT Solutions Architect for Cable & Wireless Business Solutions in Central America, Colombia, and the Caribbean, designing Cloud architectures and Disaster Recovery services.
Prior to that, Mr. Futch was overseeing IT strategy and operations for a regional development bank in the Central American region for more than 22 years. Recognized as CIO of the Year (2008) by IT Now magazine, for leading Business Continuity and Core Banking system renewal projects. Speaker for various international conferences in Guatemala, Honduras, Mexico, Colombia, and Costa Rica, TEDx Tegucigalpa. Recognized as an ACM Senior Member for his career in the IT industry. He also has more than 25 years as a Computer Science educator at universities in Guatemala and Honduras (Compilers/Operating Systems)
He holds various IT certifications on Information Security, Six Sigma quality management and various platforms.
Links:
Similar Presentations: