Executive Vice President, Technology
Wells Fargo & Co. - tentative
With an increase in cyber attacks over the years and the heightened awareness of the severe harm it can cause an organization, how to protect your organization’s information when utilizing IA technologies has been of utmost concern to all.
In this session, we will explore:
- Technological safeguards specifically designed to protect an organizations’ data infrastructure
- Access fulfillment, provision/deprovisioning, access certification, access analytics, privileged access management
- Security scanning tools as part of the bot creation process to scan code created in the back end for security vulnerabilities
- How to enforce passwords consistently across bot sessions and centralize bot identity and access management processes to leverage encrypted credential managers to prevent leakage of credentials