This event has ended. Visit the official site or create your own event on Sched.
ONLINE REGISTRATION IS NOW CLOSED. Please visit us on-site during registration hours next week to get a badge.

About the CONNECT Conference:                                                        

Today’s threat landscape is broad and sophisticated, and the consequences for failing to adequately protect against threats and respond appropriately when an attack is underway are far reaching. SecureAuth and Core Security deliver to enterprise-class organizations a discover, secure & protect, and respond capability that is only possible with vulnerability, endpoint, and network security fused with a strong identity protection framework.

Identity-based security automation is a new category that reflects the challenges of a silo’ed approach to enterprise security. Automation in the security operations center (SOC) is the inevitable result of increasingly sophisticated technologies and automation is only possible when false positive and negative results are minimal and the response action is precise and coordinated to minimize restrictions on legitimate access to enterprise resources.

SecureAuth and Core Security customers attending the CONNECT event will hear from company leaders, respected speakers, and industry peers on this new approach to the threat landscape. Product sessions will dive into details on current and future products, and research team members will be available to discuss new technologies. 


Back To Schedule
Tuesday, October 17 • 3:15pm - 4:00pm
An Identity Evolution - IAM Eastman!

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Eastman started its identity journey in 2013 when they looked to acquire an Identity Management (IDM) solution that ended with the purchase of Courion (Core Security).

The first objective was to replace an existing password synchronization product, roll out self-service password reset, and eliminate PII access from the Global Help Desk. 

Phase 2 was geared toward automation; onboarding and off-boarding of users.  In addition, Eastman set out to establish an authoritative source for third parties using SecZetta’s NE Profile solution. By implementing an authoritative source built for third parties, Eastman aimed to bring the same automation to third party, non-employees.

In this session, you will hear Eastman highlight the information collection processes, adoption techniques, result tracking, lessons learned, and future aspirations. 

avatar for Justin Matthews

Justin Matthews

Security Analyst, Eastman Chemical
Justin Matthews has worked in the Security field at Eastman for the past 3 and half years.  He started off working on endpoint security, and quickly transitioned to identity and access management (IDM).  Justin transitioned to become the lead technical analyst on IDM in late 2015... Read More →

Tuesday October 17, 2017 3:15pm - 4:00pm EDT
Ellington Salon B