Webinar

IGA: Internal Identities Are a Given, External Ones Are the Real Challenge – But True Security Requires Both

In today’s digital landscape, managing who has access to what—and when—is vital to organizational security. While internal identity governance is often well established, external identities such as contractors, partners, and service providers can present hidden risks if not properly managed.

Find out more

Speakers

arca-consult_klaus-tietze.jpg

Klaus Tietze

Information Security Manager, ARCA-Consult

For over 20 years, Klaus Tietze has been deeply involved in the implementation of Information Security Management Systems (ISMS). His focus is on combining security requirements with efficient application, ensuring the "meaningful implementation" of regulatory and legal requirements for companies.

As a Managing Consultant, he possesses extensive knowledge and practical experience in specialized areas of rights management, including identity access, high-privileged access, and SIEM management. Klaus Tietze has significantly supported clients ranging from SMEs to large corporations in implementing BAIT, VAIT, and KAIT, as well as achieving TISAX® certification.

Beta Systems Mitarbeiter Detlef Sturm

Detlef Sturm

Senior Business Consultant & Product Evangelist

Detlef Sturm, Senior Business Consultant and Product Evangelist at Beta Systems, has more than 20 years of experience in the field of Identity and Access Management (IAM). Among other things, he was responsible for the development of Access Intelligence solutions. His current focus is on access design, particularly in the areas of role mining and role engineering.

This on-demand webinar explores how Identity Governance & Administration (IGA) can be extended to manage both internal and external identities with confidence and compliance.

What You'll Learn:

  • The Hidden Risks of External Identities: Why managing third-party identities is more complex—and more critical—than ever.

  • Regulatory Compliance & Audit Readiness: Understand how frameworks like NIS-2, DORA, and TISAX impact identity management requirements for external actors.

  • Best Practices in Authorization Design: Should external users inherit internal roles, or is a separate role model safer? We explore practical approaches.

  • Data Gaps & Documentation Challenges: How to maintain oversight when external identity data doesn’t live in your HR system.

  • Contractual Complexity: Addressing varied contract types (e.g., service, freelance, temporary) in a unified IGA model.

Why Watch This Recording?

Whether you’re in IT security, compliance, or identity governance, this session offers strategic insights and actionable takeaways that will help your organization strengthen its identity posture—beyond employees.

Don’t miss your chance to build a more secure and compliant IGA framework—on your own schedule.

Find out more

Images

iga-internal-identities.jpg

Overview

Date
April 3, 2025
Language
German
Duration
60 minutes
Online

Tags

IAMIdentity Lifecycle Management

Share

Further Resources

Analyst Report
2025-ema-analyst-report.jpg

Download the EMA Radar Report 2025: Get the Full Profile of ANOW!® Suite by Beta Systems

Discover why ANOW!® Suite by Beta Systems ranked number one in the Enterprise Management Associates Radar Report for Workload Automation and Orchestration 2025 for the fourth consecutive time, with top scores in Product Strength and Deployment Cost Efficiency and special recognition for observability‑enabled automation. Beta Systems is recognized by analysts for its pioneering approach—infusing observability and AI into orchestration and setting a new benchmark for advanced workload automation platforms.
Success Story
Skandinaviska Enskilda Banken AB SEB Frankfurt Logo

How SEB Empowers Its Mainframe Developers with Insights from XINFO

How does one of Northern Europe’s largest banks enable hundreds of mainframe developers to work faster, safer, and more innovatively? SEB showcases how XINFO has become a true game changer, delivering precise impact analysis, open data access, custom tooling capabilities, and impressive enterprise-scale performance. Take a look behind the scenes of a mainframe success story that demonstrates what modern developer experience on z/OS looks like today.
Blog Article
blogpost_gartner_hype_cycle.jpg

Navigating the Future of I&O Automation: Key Insights from Gartner's 2025 Hype Cycle™

The landscape of Infrastructure and Operations (I&O) automation continues to evolve at a rapid pace, with emerging technologies promising to transform how organizations manage their IT infrastructure. Gartner's latest Hype Cycle™ for I&O Automation 2025 reveals fascinating insights into which technologies are gaining momentum and which are approaching mainstream adoption. This comprehensive analysis offers I&O leaders a roadmap for making strategic technology investments in an increasingly complex digital ecosystem.