Webinar

IGA: Internal Identities Are a Given, External Ones Are the Real Challenge – But True Security Requires Both

arca-consult_klaus-tietze.jpg
Klaus Tietze
Information Security Manager, ARCA-Consult
Beta Systems Mitarbeiter Detlef Sturm
Detlef Sturm
Senior Business Consultant & Product Evangelist

In today’s digital landscape, managing who has access to what – and when – is vital to organizational security. While internal identity governance is often well established, external identities such as contractors, partners, and service providers can present hidden risks if not properly managed.

Find out more

This on-demand webinar explores how Identity Governance & Administration (IGA) can be extended to manage both internal and external identities with confidence and compliance.

What You'll Learn:

  • The Hidden Risks of External Identities: Why managing third-party identities is more complex – and more critical – than ever.

  • Regulatory Compliance & Audit Readiness: Understand how frameworks like NIS-2, DORA, and TISAX impact identity management requirements for external actors.

  • Best Practices in Authorization Design: Should external users inherit internal roles, or is a separate role model safer? We explore practical approaches.

  • Data Gaps & Documentation Challenges: How to maintain oversight when external identity data doesn’t live in your HR system.

  • Contractual Complexity: Addressing varied contract types (e.g., service, freelance, temporary) in a unified IGA model.

Why Watch This Recording?

Whether you’re in IT security, compliance, or identity governance, this session offers strategic insights and actionable takeaways that will help your organization strengthen its identity posture – beyond employees.

Don’t miss your chance to build a more secure and compliant IGA framework – on your own schedule.

Speakers

arca-consult_klaus-tietze.jpg
Klaus Tietze
Information Security Manager, ARCA-Consult

For over 20 years, Klaus Tietze has been deeply involved in the implementation of Information Security Management Systems (ISMS). His focus is on combining security requirements with efficient application, ensuring the "meaningful implementation" of regulatory and legal requirements for companies.

As a Managing Consultant, he possesses extensive knowledge and practical experience in specialized areas of rights management, including identity access, high-privileged access, and SIEM management. Klaus Tietze has significantly supported clients ranging from SMEs to large corporations in implementing BAIT, VAIT, and KAIT, as well as achieving TISAX® certification.

Beta Systems Mitarbeiter Detlef Sturm
Detlef Sturm
Senior Business Consultant & Product Evangelist

Detlef Sturm, Senior Business Consultant and Product Evangelist at Beta Systems, has more than 20 years of experience in the field of Identity and Access Management (IAM). Among other things, he was responsible for the development of Access Intelligence solutions. His current focus is on access design, particularly in the areas of role mining and role engineering.

Further Resources

Blog Article
Data Pipelines

The Benefits of Data Pipeline Automation

As we move further into Industry 4.0, organizations are striving for greater efficiency, visibility, and reliability. This is especially true for enterprises, which handle vast amounts of data on a daily basis. The competition won’t be waiting – you’ll either move forward or fall behind. One way to avoid falling behind and improve overall efficiency is to automate data pipelines. Not only does it improve and accelerate data flow, but it also supports your analytics, helping you draw more accurate conclusions and make more precise predictions and forecasts. In this article, we will explore what data pipeline automation is, how to automate your data pipelines, and the benefits it brings to your organization.
Blog Article
website-blog-post.png

Data Workflow Automation: Complete Guide (2026)

Did you know that data teams waste up to 20% of their working week wrestling with failed scripts, stale exports, and manual reconciliation long before a single insight reaches a dashboard? If your pipelines still rely on cron jobs and spreadsheet management, you are not slow by accident. Data workflow automation replaces those manual, error-prone data tasks with reliable, end-to-end automated pipelines that ingest, validate, transform, and deliver data automatically and at enterprise scale.  This guide covers everything you need to know: what it is, why it matters, the types and components involved, the leading automation tools, and how to implement it in your organization.
Blog Article
Enterprise Automation Software Cloud Environment

Top 7 Features to Look for in Enterprise Automation Software

What features should your enterprise automation software have? At a minimum, it should provide efficiency-boosting capabilities such as real-time automation of business-critical processes, application process automation, and strong security measures like secure data transfer and robust data pipeline orchestration. In this article, we outline the most essential features to look for in enterprise automation software.