Security Consultant/Team Lead
Alex is a young enthusiastic and hard working IT guy. He joined our team of volunteers after he had attended Peak IT #003 and shortly after offered to hold an 8-week Cybersecurity training in AgileHub.
With more than 6 years in IT (the last 4 being a Security Consultant in a big IT company), he is eager to always learn and to share the lessons with the community. Throughout the past few years, he has been studying and got certified in areas such as Cloud, Digital Identity and Security.
When attending his trainings, one is surprised by the combination of knowledge and charisma that make participants connect with him.
In his free time, he is passionate about psychology and travelling and also playing guitar and music in general. Alex has secretly told us he intends to participate at some contests in the near future. You can call us subjective and we will definitely vote for him.
Workshop – Digital Identity in the Modern World
The goal of the workshop
The goal of the workshop is to understand the Digital Identity domain, how it is approached currently in organizations and what responsibilities exist for Security departments and employees. Identity and Access Management as well as Privileged Access Management will be discussed and modern approaches for authentication and authorization in the contemporary corporate world will be detailed.
What will we do in this workshop?
We will discuss IAM/PAM principles, methodology and design patterns. We will evaluate the importance of this domain in the current digital landscape, taking into account topics such as Cloud, IoT and service based applications, that add another layer of complexity to this Security domain.
You are in the target of the audience if you:
- Are familiar with identity and access management topics
- Have knowledge about security in general
- You know about authentication and authorization processes in organizations
What will you learn at the end:
At the end of the workshop, the participant should be able to articulate what IAM/PAM mean, how authentication and authorization should ideally be performed in a modern environment and what difficulties exist in contemporary organizations.
What tools do you need installed on your computer before the workshop starts
- No tools required
In case you register for this workshop and you need info regarding tools, let us know, either by email or on Facebook Messenger.