1 / 21

The Importance of Compliant Identity & Access Management in Insurance

The Importance of Compliant Identity & Access Management in Insurance. Tuncay Küçüktaş - Aksigorta Assistant General Manager, CIO. What is Compliant Identity & Access Management ?. .. is about the end-to-end life cycle management of digital identities.

spiro
Download Presentation

The Importance of Compliant Identity & Access Management in Insurance

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Importance of Compliant Identity & Access Management in Insurance Tuncay Küçüktaş - Aksigorta Assistant General Manager, CIO

  2. What is Compliant Identity & Access Management ? ..is about the end-to-end life cycle management of digital identities .. should be designed to initiate, modify, track, record, and terminate the specific identifiers associated with each account, whether human or nonhuman, by making use of the organization’s IT resources ..is the security discipline that enables the right individuals to access the right resources at the right times for the right reasons • ..is the key enabler and fundamental to Security and compliance ..is the set of business processes information and technology for managing and using digital identities Tuncay Küçüktaş / 2

  3. The Importance of Compliant IAM in Insurance Tuncay Küçüktaş / 3

  4. Why important ? Tuncay Küçüktaş / 4

  5. Why important ? Tuncay Küçüktaş / 5

  6. Why important ? Tuncay Küçüktaş / 6

  7. Why important ? Tuncay Küçüktaş / 7

  8. How IAM Supports Compliancy • Identity and access management (IAM) technology and methods provide directsupport for the compliancy requirements for; • fraud reduction • policy enforcement • risk assessment • compliance & auditing Tuncay Küçüktaş / 8

  9. Typical IAM Framework - Today

  10. IAM and GRC Complements Each Other

  11. Typical User Challenges Source : SAP Tuncay Küçüktaş / 11

  12. Compliant, Business-Driven Identity Management Process Flow Source : SAP Tuncay Küçüktaş / 12

  13. Common IAM areas (business value & risk reduction) Tuncay Küçüktaş / 13

  14. How to Implement Compliant IAM ? Develop a strategy Don’t think of Compliant IAM as an IT-only initiative Be prepared for objections and concerns Avoid the “Big Bang” approach Don’t rush Createyour inventories Start withenterprise-level roles first Tuncay Küçüktaş / 14

  15. Potential Impacts of NonCompliancy • Lower costs and higher productivity • Flexibility • Compliance • Improved life cycle of employees, partners, andcustomers • Moving the management responsibility from IT to business process owners • Severe penalties in cases of noncompliance • High financial costs to comply with regulatory requirements • Diversion of executive attention as effort is focused on compliance activities ratherthan business priorities Business Benefits Tuncay Küçüktaş / 15

  16. Challenges • Incorrect Strategy • Staff resistance • Cultural and political realities • Lack of skills • Bureaucracy • Scope creep • Inappropriate automation ! Tuncay Küçüktaş / 16

  17. By year-end 2020, 80% of user access will be shaped by new mobile and non-PC architectures thatservice all identity types regardless of origin Tuncay Küçüktaş / 17

  18. By 2020, 60% of all digital identities interacting with enterprises will come from external identity providers through a competitive marketplace Tuncay Küçüktaş / 18

  19. By 2020, the Internet of Thingswill redefine the concept of identity management to include what people own, share and use Tuncay Küçüktaş / 19

  20. Cloud and Mobility • The Internet of Things • Growing more digitalized marketplace • Identity Analytics Predicts For Future

  21. THANK YOU

More Related