-
Be the first to like this
Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our User Agreement and Privacy Policy.
Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our Privacy Policy and User Agreement for details.
Managing Cybersecurity demands in IT sourcing projects: A guideline using the example of Identity & Access Management. This presentation outlines the topic of Identity & Access Management in complex IT landscapes and IT services supply chains by the help of practical examples and by comparing reality and cyberspace. It also makes recommendations for the access management for organizational IT systems.
Be the first to like this
Login to see the comments