Webinar

IGA: Internal Identities Are a Given, External Ones Are the Real Challenge – But True Security Requires Both

In today’s digital landscape, managing who has access to what – and when – is vital to organizational security. While internal identity governance is often well established, external identities such as contractors, partners, and service providers can present hidden risks if not properly managed.

Find out more

This on-demand webinar explores how Identity Governance & Administration (IGA) can be extended to manage both internal and external identities with confidence and compliance.

What You'll Learn:

  • The Hidden Risks of External Identities: Why managing third-party identities is more complex – and more critical – than ever.

  • Regulatory Compliance & Audit Readiness: Understand how frameworks like NIS-2, DORA, and TISAX impact identity management requirements for external actors.

  • Best Practices in Authorization Design: Should external users inherit internal roles, or is a separate role model safer? We explore practical approaches.

  • Data Gaps & Documentation Challenges: How to maintain oversight when external identity data doesn’t live in your HR system.

  • Contractual Complexity: Addressing varied contract types (e.g., service, freelance, temporary) in a unified IGA model.

Why Watch This Recording?

Whether you’re in IT security, compliance, or identity governance, this session offers strategic insights and actionable takeaways that will help your organization strengthen its identity posture – beyond employees.

Don’t miss your chance to build a more secure and compliant IGA framework – on your own schedule.

Speakers

arca-consult_klaus-tietze.jpg
Klaus Tietze
Information Security Manager, ARCA-Consult

For over 20 years, Klaus Tietze has been deeply involved in the implementation of Information Security Management Systems (ISMS). His focus is on combining security requirements with efficient application, ensuring the "meaningful implementation" of regulatory and legal requirements for companies.

As a Managing Consultant, he possesses extensive knowledge and practical experience in specialized areas of rights management, including identity access, high-privileged access, and SIEM management. Klaus Tietze has significantly supported clients ranging from SMEs to large corporations in implementing BAIT, VAIT, and KAIT, as well as achieving TISAX® certification.

Beta Systems Mitarbeiter Detlef Sturm
Detlef Sturm
Senior Business Consultant & Product Evangelist

Detlef Sturm, Senior Business Consultant and Product Evangelist at Beta Systems, has more than 20 years of experience in the field of Identity and Access Management (IAM). Among other things, he was responsible for the development of Access Intelligence solutions. His current focus is on access design, particularly in the areas of role mining and role engineering.

Further Resources

Blog Article
batch-job-scheduling-blog-post.png

Batch Job Scheduling: Features, Benefits & Top Platforms in 2026

Managing thousands of IT jobs across hybrid environments is complex, and when batch processes fail, the business feels it immediately. Whether it’s a missed end-of-day report, a delayed data pipeline, or a financial close that runs hours late, batch scheduling failures are costly. Batch job scheduling is the solution to this. Keep reading to find out what it means, the key features to look for, common challenges, and the top batch scheduling platforms available in 2026.
Blog Article
5-best-devops-automation-tools-with-text.png

5 Best DevOps Automation Tools Reviewed in 2026

DevOps teams are under pressure to ship faster, reduce errors, and keep complex pipelines running across cloud, on-premises, and hybrid environments all at once. The right DevOps automation tools make that possible. The wrong ones create more fragmentation than they solve. This guide reviews the five best DevOps automation tools in 2026, covering what each does well, where each falls short, and which teams each is actually built for.
Blog Article
Mainframe

Top 6 Reasons Your Competitors Are Replacing Their Legacy Systems

This article explores why enterprises are moving away from legacy mainframe systems toward modern solutions such as those offered by Beta Systems. As rising costs, vendor lock-in, and increasing demands from AI-driven, compliance-focused environments put pressure on traditional IT infrastructures, organizations are seeking more agile, transparent, and cost-efficient alternatives. In this article, we discuss the top six reasons that are driving your competitors to these alternative solutions and how you can do the same without disrupting your workflows.