{"id":3229,"date":"2025-04-07T11:41:42","date_gmt":"2025-04-07T09:41:42","guid":{"rendered":"https:\/\/pask.id\/webinar-what-is-idm-iam-how-does-pask-address-regulatory-requirements\/"},"modified":"2025-10-20T17:49:24","modified_gmt":"2025-10-20T15:49:24","slug":"webinar-what-is-idm-iam-how-does-pask-address-regulatory-requirements","status":"publish","type":"post","link":"https:\/\/pask.id\/en\/webinar-what-is-idm-iam-how-does-pask-address-regulatory-requirements\/","title":{"rendered":"Webinar: What is IdM\/IAM? How does PASK address regulatory requirements?"},"content":{"rendered":"\n<p>As many as 83% of companies in Poland registered at least one cybersecurity incident in 2024, which means an increase of 16 percentage points compared to the previous year &#8211; reports the latest report &#8220;Cybersecurity Barometer&#8221; by KPMG.<\/p>\n\n<p><br\/>Cybersecurity isn&#8217;t just about technology, it&#8217;s not about advanced AI; it&#8217;s primarily about people \u2013 their awareness of threats and constant education about evolving types of threats. IdM\/IAM systems, which enable precise granting and revoking of access to an organization&#8217;s IT resources, combined with employee education, are now an important part of the company&#8217;s &#8220;armor&#8221; protecting against attacks. And as statistics show, hackers are increasingly targeting smaller companies, hoping for &#8220;holes&#8221; and &#8220;leaks&#8221; in the armor.  <br\/><br\/>There is no need to convince anyone that investments in cybersecurity are essential these days &#8211; there is a measurable risk of financial and reputational losses, criminal liability of management board members, and even disappearance from the market.<br\/><br\/>Managing access to company systems via Excel, or even ITSM, without a dedicated tool is no longer convenient?<\/p>\n\n<p>The multitude of regulations and controls on the horizon is frightening. How can you prove everything is in accordance with the auditor&#8217;s instructions without painstaking data collection?<br\/><br\/>We&#8217;re launching a new PASK webinar series! Space is limited. <\/p>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p>Join us for our first kick-off meeting and you will learn:<\/p>\n\n<ul class=\"wp-block-list \\&quot;wp-block-list\\&quot;\">\n<li>What is IdM (Identity Management) and IAM (Identity and Access Management)?<\/li>\n\n\n\n<li>What challenges does an increasingly unpredictable world pose to businesses related to digital identity and access management?<\/li>\n\n\n\n<li>How does IdM PASK respond to regulatory needs in the area of \u200b\u200bdata protection and compliance?<\/li>\n<\/ul>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p>Why is it worth taking part in our webinar?<\/p>\n\n<ul class=\"wp-block-list \\&quot;wp-block-list\\&quot;\">\n<li>You will learn the basic aspects of permission management in the context of regulation.<\/li>\n\n\n\n<li>You will learn how to avoid the risks associated with non-compliance with regulations.<\/li>\n\n\n\n<li>You will receive practical tips on how to effectively implement the IdM system in your organization.<\/li>\n<\/ul>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p>Date: April 15, 2025, 11:00-11:40<br\/><\/p>\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p class=\"has-medium-font-size\"><\/p>\n\n<p>Speaker: Konrad Kochanowski &#8211; IT Analyst, Development Team<\/p>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p><strong>Register for the event at the link<\/strong>: <a href=\"%5C%22https:\/\/tiny.pl\/1n45wx08%5C%22\" target=\"\\\" _blank=\"\" rel=\"\\\" noreferrer=\"\">https:\/\/tiny.pl\/1n45wx08<\/a><\/p>\n\n<p class=\"has-medium-font-size\"><\/p>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p class=\"has-medium-font-size\"><\/p>\n\n<p>Don&#8217;t miss the opportunity to discover a solution that supports regulatory compliance and increases security in your organization!<\/p>\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As many as 83% of companies in Poland registered at least one cybersecurity incident in 2024, which means an increase of 16 percentage points compared to<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":5,"featured_media":3230,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[105,106,107],"tags":[],"class_list":["post-3229","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-iam","category-idm","category-news"],"_links":{"self":[{"href":"https:\/\/pask.id\/en\/wp-json\/wp\/v2\/posts\/3229","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pask.id\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pask.id\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pask.id\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/pask.id\/en\/wp-json\/wp\/v2\/comments?post=3229"}],"version-history":[{"count":1,"href":"https:\/\/pask.id\/en\/wp-json\/wp\/v2\/posts\/3229\/revisions"}],"predecessor-version":[{"id":3231,"href":"https:\/\/pask.id\/en\/wp-json\/wp\/v2\/posts\/3229\/revisions\/3231"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pask.id\/en\/wp-json\/wp\/v2\/media\/3230"}],"wp:attachment":[{"href":"https:\/\/pask.id\/en\/wp-json\/wp\/v2\/media?parent=3229"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pask.id\/en\/wp-json\/wp\/v2\/categories?post=3229"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pask.id\/en\/wp-json\/wp\/v2\/tags?post=3229"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}