Upcoming Webinars Archived Webinars Training Vitals Host A Webinar About Get Updates Contact
Trust but Verify…Managing and Auditing Privileged Users
Keynote speakers:
  • Christopher Bauserman, Manager of Security and Compliance Product Management,
        IBM Tivoli  Learn More
  • Lori Rowland, Senior Analyst, Burton Group Identity and Privacy Strategies  Learn More
  • Mark Diodati, Senior Analyst, Burton Group Identity and Privacy Strategies  Learn More

    Join this webcast for a discussion on how to better manage, monitor and audit the most powerful and thereby potentially the most dangerous user – the privileged user.  An analyst will highlight the importance of managing the privileged user, the damage that can and have been caused by privileged users and highlight a strategy to better manage privileged users.  IBM will then identify how IBM identity and access management products and services can help address this security and compliance challenge.


    • CSOs, CISOs, CCOs, CTOs
    • VPs, Directors of IT, Security, Risk Management
    • VPs, Directors of Compliance
    • VPs, Directors of Operations
    • Application Development, Enterprise Architects
    • IT Consultants

    Christopher Bauserman, Manager of Security and Compliance Product Management, IBM Tivoli  

    Chris Bauserman is responsible for product management of IBM Tivoli security and compliance software products in Austin, TX and has over 12 year experience leading and executing technology based business strategies.  Chris has previously worked as an advisor and consultant to several startup companies in the fields of homeland security, home automation, and new media product design.  In collaboration with the government of Honduras and the MIT Media Lab, he worked to leverage emerging technologies to raise the standards of living in that country’s remote regions.  Chris began his career in management consulting where he advised Global 2000 clients on the strategic use of information technology and aided in the execution of these strategies across a wide range of client/server, Internet, and digital media technologies.


    Chris holds an MBS from the MIT Sloan School of Management, where he helped run the MIT Entrepreneurship Competition, and as BS in Industrial and Operations Engineering from the University of Michigan.  In his free time he enjoys travel, SCUBA diving, running, biking, wine tasting, and Austin’s live music scene.  Chris is also an active volunteer with Habitat for Humanity.

    Lori Rowland, Senior Analyst, Burton Group Identity and Privacy Strategies 

    Lori Rowland is a Senior Analyst for Burton Group Identity and Privacy Strategies.  She covers identity management, provisioning, and directories.  Prior to joining Burton Group, Lori was part of Novell’s Security Identity Management development team as Director of XML deployment manager.


    With 10 years of experience, Lori’s expertise in ERP applications, business process design, directory services, identity management and provisioning has provided her frequent speaking appearance at BrainShare, and PeopleSoft’s end-user conference.

    Mark Diodati, Senior Analyst, Burton Group Identity and Privacy Strategies  

    Mark Diodati is a Senior Analyst for Burton Group Identity and Privacy Strategies.  He covers identity management, authentication, provisioning, cryptography, directories, web access management, and operating system security.  Mark’s previous positions include Vice President of Computer Associate’s Worldwide Identity and Access Management Practice; Director of Product Management for Computer Associate’s federation, web access management, and SSP products; Senior Product Manager for RSA Security’s smart card, SSO, mobile PKI, and file encryption products.


    With 18 years if experience, Mark implemented information security systems for Internet banking, data warehousing, UNIX, strong authentication, and the network at Metavante, a financial services data processing organization with more than 5,100 clients, including the largest 20 banks in the United States.


    Mark’s certifications include CPA, CISA and CISM.  He is a contributor to ABC News, eWeek Magazine, Internet Security Magazine and Network Magazine.


    At IBM, we strive to lead in the invention, development and manufacture of the industry's most advanced information technologies. We translate these advanced technologies into value for our customers through hardware and software solutions, professional and managed services and consulting business offerings worldwide. Our Information Management, Lotus, Rational, Tivoli and WebSphere software brands are aligned around a single, focused business model: innovation.

    IBM takes its breadth and depth of insight on connecting operating systems, business processes, and applications seamlessly, and invents and applies technology to help solve its clients' most intractable business and competitive problems.

    IBM’s extensive portfolio and the IBM Security Framework cover the spectrum of IT and business security risks: people and identity, data and information, application and process, network, server and endpoint and physical infrastructure and have empowered our customers to operate their businesses based on the most secure infrastructure platforms for over 40 years.

    For more information about IBM Security go to: www.ibm.com/security

    For information about the recorded archive for this event contact Xtalks at (416) 977-6555 ext 371, or email register@xtalks.com

    Copyright © 2016-2017 Honeycomb Worldwide Inc.