Navigating the complexities of Identity, Credential and Access Management (ICAM) can feel like a maze of acronyms – ABAC, PBAC, CBAC and more.
Tune in live for insights from Bryan Rosensteel, Ping Identity's US Federal CTO, as he unravels the intricacies of ICAM and sheds light on fine-grained access control within a modern Zero Trust architecture.
During this webinar, you will explore how:
- To centralize ICAM policy and consolidate/reduce identity silos
- ICAM technologies work across the Zero Trust Pillars
- Attribute-based access control (ABAC) differs from role based access control (RBAC)
- ABAC and Federation work together to enable interoperability across the DOD and Coalition partners
Register now to learn practical approaches to access management in disconnected, denied, intermittent, and/or limited bandwidth (DDIL), hybrid, and air-gapped environments.