BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/Guatemala
BEGIN:STANDARD
DTSTART:20060930T230000
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20250305T054337Z
UID:29F3C8B9-B91B-48B0-8589-67ECE822FACC
DTSTART;TZID=America/Guatemala:20250327T170000
DTEND;TZID=America/Guatemala:20250328T183000
DESCRIPTION:Abstract: Identity and Access Management (IAM) plays a crucial 
 role in securing digital identities and controlling access to critical sys
 tems. This presentation will cover fundamental IAM concepts\, including Si
 ngle Sign-On (SSO)\, Multi-Factor Authentication (MFA)\, and Privileged Ac
 cess Management (PAM). It will also explore emerging trends such as passwo
 rd less authentication\, AI-driven security\, and decentralized identity s
 olutions. Additionally\, I will discuss key cybersecurity challenges like 
 identity theft\, MFA fatigue attacks\, and insider threats\, along with co
 mpliance standards such as NIST\, GDPR\, and PCI . Industry-specific IAM a
 pplications and implementation strategies will provide organizations with 
 a roadmap to enhance security\, mitigate risks\, and ensure compliance in 
 an evolving digital landscape.\n\nSpeaker - Nirupam Samanta With over 17 y
 ears of expertise in IT\, specializing in Identity and Access Management (
 IAM)\, Secure System Design\, Vulnerability Management\, and Risk &amp; Compli
 ance\, I bring a proven track record of delivering strategic\, secure\, an
 d innovative solutions. My experience spans working with diverse IAM and s
 ecurity tools (SailPoint IIQ\, Oracle Identity Governance\, Qualys VMDR)\,
  auditing standards (SOX\, ISO 27001\, PCI/DSS)\, and implementing access 
 management protocols (SAML\, OAuth\, SSO). Certified in CISSP\, CCSP\, AWS
  Solutions Architecture\, CEH\, and ITIL V3\, I excel in team management\,
  technical project delivery\, and fostering cross-functional collaboration
  to ensure security and compliance in complex IT environments.\n\nVirtual:
  https://events.vtools.ieee.org/m/472886
LOCATION:Virtual: https://events.vtools.ieee.org/m/472886
ORGANIZER:prasenjit.banerjee1984@gmail.com
SEQUENCE:20
SUMMARY:Topic: Safeguarding Digital Identities - A Modern Approach
URL;VALUE=URI:https://events.vtools.ieee.org/m/472886
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial\, helvetic
 a\, sans-serif\; font-size: 12pt\;&quot;&gt;&lt;span style=&quot;caret-color: rgb(34\, 34\
 , 34)\; color: rgb(34\, 34\, 34)\; font-style: normal\; font-variant-caps:
  normal\; font-weight: 400\; letter-spacing: normal\; text-align: start\; 
 text-indent: 0px\; text-transform: none\; white-space: normal\; word-spaci
 ng: 0px\; -webkit-text-stroke-width: 0px\; background-color: rgb(255\, 255
 \, 255)\; text-decoration: none\; display: inline !important\; float: none
 \;&quot;&gt;Abstract:&amp;nbsp\;&lt;/span&gt;&lt;span style=&quot;caret-color: rgb(34\, 34\, 34)\; c
 olor: rgb(34\, 34\, 34)\; font-style: normal\; font-variant-caps: normal\;
  font-weight: 400\; letter-spacing: normal\; text-align: start\; text-inde
 nt: 0px\; text-transform: none\; white-space: normal\; word-spacing: 0px\;
  -webkit-text-stroke-width: 0px\; text-decoration: none\;&quot;&gt;Identity and Ac
 cess Management (IAM) plays a crucial role in securing digital identities 
 and controlling access to critical systems. This presentation will cover f
 undamental IAM concepts\, including Single Sign-On (SSO)\, Multi-Factor Au
 thentication (MFA)\, and Privileged Access Management (PAM). It will also 
 explore emerging trends such as password&lt;/span&gt;&lt;span class=&quot;gmail_default&quot;
  style=&quot;caret-color: rgb(34\, 34\, 34)\; color: rgb(34\, 34\, 34)\; font-s
 tyle: normal\; font-variant-caps: normal\; font-weight: 400\; letter-spaci
 ng: normal\; text-align: start\; text-indent: 0px\; text-transform: none\;
  white-space: normal\; word-spacing: 0px\; -webkit-text-stroke-width: 0px\
 ; text-decoration: none\;&quot;&gt;&amp;nbsp\;&lt;/span&gt;&lt;span style=&quot;caret-color: rgb(34\
 , 34\, 34)\; color: rgb(34\, 34\, 34)\; font-style: normal\; font-variant-
 caps: normal\; font-weight: 400\; letter-spacing: normal\; text-align: sta
 rt\; text-indent: 0px\; text-transform: none\; white-space: normal\; word-
 spacing: 0px\; -webkit-text-stroke-width: 0px\; text-decoration: none\;&quot;&gt;l
 ess authentication\, AI-driven security\, and decentralized identity solut
 ions.&amp;nbsp\;&lt;/span&gt;&lt;span style=&quot;caret-color: rgb(34\, 34\, 34)\; color: rg
 b(34\, 34\, 34)\; font-style: normal\; font-variant-caps: normal\; font-we
 ight: 400\; letter-spacing: normal\; text-align: start\; text-indent: 0px\
 ; text-transform: none\; white-space: normal\; word-spacing: 0px\; -webkit
 -text-stroke-width: 0px\; text-decoration: none\;&quot;&gt;Additionally\, I will d
 iscuss key cybersecurity challenges like identity theft\, MFA fatigue atta
 cks\, and insider threats\, along with compliance standards such as NIST\,
  GDPR\, and&amp;nbsp\;&lt;/span&gt;&lt;span style=&quot;caret-color: rgb(34\, 34\, 34)\; col
 or: rgb(34\, 34\, 34)\; font-style: normal\; font-variant-caps: normal\; f
 ont-weight: 400\; letter-spacing: normal\; text-align: start\; text-indent
 : 0px\; text-transform: none\; white-space: normal\; word-spacing: 0px\; -
 webkit-text-stroke-width: 0px\; text-decoration: none\;&quot;&gt;P&lt;/span&gt;&lt;span cla
 ss=&quot;gmail_default&quot; style=&quot;caret-color: rgb(34\, 34\, 34)\; color: rgb(34\,
  34\, 34)\; font-style: normal\; font-variant-caps: normal\; font-weight: 
 400\; letter-spacing: normal\; text-align: start\; text-indent: 0px\; text
 -transform: none\; white-space: normal\; word-spacing: 0px\; -webkit-text-
 stroke-width: 0px\; text-decoration: none\;&quot;&gt;CI&amp;nbsp\;&lt;/span&gt;&lt;span style=&quot;
 caret-color: rgb(34\, 34\, 34)\; color: rgb(34\, 34\, 34)\; font-style: no
 rmal\; font-variant-caps: normal\; font-weight: 400\; letter-spacing: norm
 al\; text-align: start\; text-indent: 0px\; text-transform: none\; white-s
 pace: normal\; word-spacing: 0px\; -webkit-text-stroke-width: 0px\; text-d
 ecoration: none\;&quot;&gt;. Industry-specific IAM applications and implementation
  strategies will provide organizations with a roadmap to enhance security\
 , mitigate risks\, and ensure compliance in an evolving digital landscape.
 &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;\n&lt;p&gt;&lt;span style=&quot;caret-color: rgb(34\, 34\, 34)\; color
 : rgb(34\, 34\, 34)\; font-style: normal\; font-variant-caps: normal\; fon
 t-weight: 400\; letter-spacing: normal\; text-align: start\; text-indent: 
 0px\; text-transform: none\; white-space: normal\; word-spacing: 0px\; -we
 bkit-text-stroke-width: 0px\; text-decoration: none\; font-family: arial\,
  helvetica\, sans-serif\; font-size: 12pt\;&quot;&gt;Speaker - Nirupam Samanta &lt;sp
 an style=&quot;caret-color: rgb(34\, 34\, 34)\; color: rgb(34\, 34\, 34)\; font
 -style: normal\; font-variant-caps: normal\; font-weight: 400\; letter-spa
 cing: normal\; text-align: start\; text-indent: 0px\; text-transform: none
 \; white-space: normal\; word-spacing: 0px\; -webkit-text-stroke-width: 0p
 x\; background-color: rgb(255\, 255\, 255)\; text-decoration: none\; displ
 ay: inline !important\; float: none\;&quot;&gt;With over 17 years of expertise in 
 IT\, specializing in Identity and Access Management (IAM)\, Secure System 
 Design\, Vulnerability Management\, and Risk &amp;amp\; Compliance\, I bring a
  proven track record of delivering strategic\, secure\, and innovative sol
 utions. My experience spans working with diverse IAM and security tools (S
 ailPoint IIQ\, Oracle Identity Governance\, Qualys VMDR)\, auditing standa
 rds (SOX\, ISO 27001\, PCI/DSS)\, and implementing access management proto
 cols (SAML\, OAuth\, SSO). Certified in CISSP\, CCSP\, AWS Solutions Archi
 tecture\, CEH\, and ITIL V3\, I excel in team management\, technical proje
 ct delivery\, and fostering cross-functional collaboration to ensure secur
 ity and compliance in complex IT environments.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;\n&lt;p&gt;&lt;span
  style=&quot;caret-color: rgb(34\, 34\, 34)\; color: rgb(34\, 34\, 34)\; font-s
 tyle: normal\; font-variant-caps: normal\; font-weight: 400\; letter-spaci
 ng: normal\; orphans: auto\; text-align: start\; text-indent: 0px\; text-t
 ransform: none\; white-space: normal\; widows: auto\; word-spacing: 0px\; 
 -webkit-text-stroke-width: 0px\; text-decoration: none\; font-family: Aria
 l\, Helvetica\, sans-serif\;&quot;&gt;&lt;img src=&quot;https://events.vtools.ieee.org/vto
 ols_ui/media/display/794c3886-882b-4dae-a517-e25a55ed74e3&quot; width=&quot;1028&quot; he
 ight=&quot;514&quot;&gt;&lt;/span&gt;&lt;/p&gt;
END:VEVENT
END:VCALENDAR

