It’s time to swim with the Shark and ask yourself ,
“Is Identity the Foundation of My Enterprise Security Program?”
SailPoint and Herjavec Group have partnered to help enterprises around the world solve Identity Challenges. We see it every day – Multiple HRIS systems, Complex Credential Repositories to Manage, Classic Attack Paths targeting Elevated Privileges. To address these challenges, and prepare for identity in the cloud, we believe security leaders need to take a business oriented approach to Identity Control.
Who better to drive this business conversation than the Shark himself?
Join Herjavec Group Founder & CEO, Shark Tank star, and security visionary, Robert Herjavec for a Cybersecurity Roundtable Conversation and Executive Dinner, all around the organizational challenges and opportunities present in Identity Governance & Administration.
This casual roundtable event is geared towards open forum discussion and Q&A with our executive leadership.
Executive Insights From
Herjavec Group’s Founder & CEO, Shark Tank Star
It’s your turn to put the Shark in the hot seat. Robert will share his views on the state of the cybersecurity market today, and provide C-level insight into his board level conversations around Identity & Access Management. Robert has served as a Cybersecurity Advisor for the Government of Canada, participated in the White House Summit on Cybersecurity and is a member of the US Chamber of Commerce Task Force for Cybersecurity. His views on the threat landscape, on emerging technologies and on the need for a proactive security framework are regularly profiled across print, digital and television mediums.
Herjavec Group’s VP of Professional Services
Eric has served as CISO at Providence Health & Services, Global Director of Information Security at Esterline Technologies, and has held a variety of Professional Services roles with expertise in risk management, governance, system engineering, and operational delivery. He is an expert in Identity Services believing strongly in the process of: (1)Building an Identity Management Foundation, (2) Prioritizing Privileged Access and (3) Controlling Access In The Cloud