Quest & One Identity User & Partner Forum, Sofia, November 2023 г.

questone-identity-userpartner-forum-2.

The forum “Quest&One Identity User & Partner” was held on November 9, 2023., in a pleasant atmosphere at the club “Joy Station”, Studentski grad. Organized by Quest Software and Escom Bulgaria, in partnership with IDVKM and New Horizons Bulgaria, the event provided valuable insight into the ever-evolving landscape of cyber and digital security.

The event brought together industry experts, business leaders, and professionals to discuss the latest trends, challenges, and solutions in cybersecurity.

From Quest, on-site in Sofia, attended:

Agenda Highlights

The varied program included keynote talks, information, demonstration sessions, and networking opportunities.

The event was opened by the Managing Director of Escom Bulgaria – Mr. Alexander Zhekov, and Mr. Ivan Pepelov, CEO of IDVKM, who outlined the main topics of the forum: cybersecurity, overall management of IT infrastructure in organizations, technological innovations in Quest and One Identity solutions, current regulatory requirements.

Bartlomiej Jakub Niewiadomski, Channel Sales Manager CEE at Quest & One Identity
Bartlomiej Jakub Niewiadomski, Channel Sales Manager CEE at Quest & One Identity

Bartlomiej Jakub Niewiadomski, Channel Sales Manager, CEE at Quest & One Identity presented the entire portfolio of Microsoft Platform Management solutions. One of the key benefits of Quest’s migration tools is their ability to automate and streamline the planning, consolidation, and migration processes while reducing the associated risks of data loss. Compatible with a wide range of platforms and technologies including Active Directory, Exchange, SharePoint, Office 365, and more. They support a variety of migration and management scenarios across on-premises, cloud, and hybrid Microsoft platforms. Collectively, these tools help organizations optimize their IT infrastructure, increase productivity, and accelerate their digital transformation initiatives.

Can your IT cope without Quest?

Marcin Michalewicz, Solutions Engineer, CEE, Quest
Marcin Michalewicz, Solutions Engineer, CEE, Quest

During the presentation “Can your IT cope without Quest?”, Marcin Michalewicz, Solutions Engineer, CEE, Quest, examines the importance of protecting the Active Directory (AD) and the limitations of traditional approaches to security, including:

Marcin Michalewicz stressed the need to adopt a more sophisticated and proactive approach to Active Directory (AD) security, including identifying and mapping attack paths, to reduce vulnerabilities and prevent unauthorized access to critical assets.

Quest offers a comprehensive and continuous cyber resilience lifecycle for Active Directory (AD) and Office 365 that provides defense-in-depth, following the NIST Cybersecurity Framework:

  • Identify.
  • Protection.
  • Detection.
  • Response.
  • Recovery.

Cybersecurity challenges and compliance with the Directive NIS 2

The agenda continued with the presentation and demonstration panels of Mr. Ivan Pepelov, CEO of IDVKM, and Mr. Valentin Hristov, Head of Identity Management at IDVKM.

Ivan Pepelov, CEO at IDVKM
Ivan Pepelov, CEO at IDVKM

Mr. Pepelow discussed One Identity’s concept of the Unified Identity Security Platform (UISP) as a unique integrated approach to identity security where organizations can gain 360-degree visibility and adaptive flexibility to ever-changing threats and IT environments. One Identity’s Unified Identity Security Platform (UISP) is an important step in achieving an adaptive Zero-Trust strategy, and integrates best-in-class capabilities to:

  • Identity Governance and Administration;
  • Access Management;
  • Privileged Access Management;
  • Active Directory Management.

To achieve compliance with the NIS 2 Directive, One Identity’s Unified Identity Security Platform (UISP) offers organizations:

In the second part of his presentation panel, Mr. Pepelov talked about the main features of OneLogin’s Access Management solution; The solution supports multiple protocols, including SAML, OpenID Connect, and OAuth2, which facilitates integration with various applications and provides single sign-on (SSO) authentication; In addition, IT security teams can more effectively monitor and control access by providing real-time visibility of user activity and access rights; In a live demonstration, Mr. Pepelov presented a workflow on user authentication, authorization, and access control;

A Modern Approach to Identity Governance and Administration with Identity Manager

Valentin Hristov, Head of Identity Management at IDVKM OOD
Valentin Hristov, Head of Identity Management at IDVKM OOD

Mr. Valentin Hristov, Head of Identity Management at IDVKM, highlighted the risks organizations face in terms of identity breaches, data integrity and abuse of privileges; It also explores the key components of the Identity Governance and Administration (IGA) solution:

Effective implementation of these key components enables organizations to properly manage and administer user identity, control access, and achieve compliance with regulatory requirements; A live demonstration of the JML processes followed, concluding the panel;

Privileged Access Management (PAM): who guards the guards?

Alexander Zhekov, General Manager at Escom Bulgaria
Alexander Zhekov, General Manager at Escom Bulgaria

In his presentation panel: “One Identity Privileged Access Management for compliance and regulations.“, Mr. Alexander Zhekov, Manager of Escom Bulgaria, presented the solution for Privileged Access Management at One Identity by Quest; It can be interpreted as an information security and cybersecurity practice focused on the management and control of privileged accounts and their access to critical systems and data within an organization;

Many organizations face several challenges in managing privileged access daily, including:

  • Too many administrators;
  • Shared passwords for root accounts;
  • Continuous escalation of privileges;
  • Lack of centralised access policies;
  • Lack of visibility into access rights;
  • Inability to comply with the “least privilege.”

One Identity’s PAM includes a range of features for:

  • detection of privileged accounts;
  • password management;
  • sessions monitoring;
  • access request and approval workflows;
  • recording of privileged sessions;
  • ensuring compliance with current regulatory requirements including ISO 27001, SOX, PCI-DSS, HIPAA, and NIS-2;

Mr. Zhekov emphasized the basic principles and best practices of privileged access management and gave a demonstration of the solution:

The capabilities that One Identity’s PAM solution offers to achieve compliance with NIS-2 requirements were also outlined:

  • Access control;
  • Zero Trust Principles;
  • Cyber security hygiene and employee training;
  • Enforcing regulations to limit or prevent ransomware attacks;
  • Password management;
  • Privileged Access Management;
  • Reporting options;
  • Third-party access control;
  • Control of ICT;
  • Risk assessment and information systems security policy.

The European Information Security Directive NIS-2 aims to address the differences in cybersecurity requirements and implementation of cybersecurity measures across EU Members. The NIS-2 Directive comes into force on 17 October 2024 and will apply to any organization with more than 50 employees and an annual turnover exceeding €10 million, as well as to any organization that was previously included in the original NIS Directive; The list of sectors and activities to be affected is also being updated; Key measures to protect organizations’ network and information systems from incidents include, as a minimum:

  • Implementation of risk analysis and information system security policies;
  • Incident handling.
  • Ensure business continuity by managing backup disaster recovery and crisis management.
  • Supply chain security, including security aspects relating to the relationship between each entity and its direct suppliers or service providers;
  • Security in the acquisition, development, and maintenance of network and information systems, including vulnerability handling and disclosure;
  • The introduction of policies and procedures to assess the effectiveness of cyber security risk management measures;
  • The introduction of basic cyber hygiene practices and cyber security training.
  • The implementation of policies and procedures regarding the use of cryptography and, where appropriate, encryption;
  • Ensure human resources, access control, and asset management policies.
  • The implementation of multi-factor authentication or continuous authentication solutions, secure voice, video, and text communications, and secure emergency communication systems within the entity, where appropriate;

Financial sanctions are also expected to be imposed in case of non-compliance with the minimum measures set;

The final topic of the event “Human Layer Security and How to prepare your cybersecurity team to keep your hybrid infrastructure secure” was presented by Mr. Nikolay Penev, Managing Director of New Horizons Bulgaria, and Mr. Lyubomir Tulev, Senior Security Trainer at the company.

Lyubomir Tulev, Senior Security Trainer at New Horizons Bulgaria
Lyubomir Tulev, Senior Security Trainer at New Horizons Bulgaria

Mr. Tulev focused on human layer security and shared his experience on how to prepare our cybersecurity team to ensure the security of our hybrid infrastructure.

Nikolay Penev, General Manager at New Horizons Bulgaria
Nikolay Penev, General Manager at New Horizons Bulgaria

Mr. Penev presented the training portfolio of New Horizons Bulgaria; As a trusted partner of many of the leading companies in the industry, New Horizons Bulgaria conducts authorized training for Microsoft, CompTIA, IBM, Information Security, Cisco, VMware, ITIL, PMP, SPM, Business Analysis, etc. Awarded with several prestigious awards locally and globally, New Horizons Bulgaria offers a whole range of certification training for Cyber Security teams, as well as several other courses in various areas including:

  • Business Productivity
  • Cloud
  • Programming
  • Cybersecurity
  • Data & Business Intelligence
  • Database Management
  • Blockchain
  • IT Infrastructure
  • Leadership & Professional Development
  • Program, Project, & Process Improvement.

Organizers

Quest Software has been delivering enterprise software solutions for more than 30 years, with offices in more than 100 countries and a customer base that includes more than 95% of Fortune 500 companies. Quest’s range of solutions and services include migration tools, security and compliance solutions, authentication process automation, user and user group management, and backup and recovery solutions;

Escom Bulgaria is a Value Added Distributor of Quest and One Identity solutions for Bulgaria. The company is B2B oriented, serving end users exclusively, through a network of qualified, expert partners, system integrators, and service providers (MSP).

IDVKM has more than 15 years of experience in Near Shore, international projects (classic and agile) with a client focus in Germany, and teams from over 10 nationalities. IDVKM offers consulting services in the areas of Identity Management, Custom Software Development, Agile/Traditional Project Management, personal skills training, as well as project management and team development.

The event finished with networking and bowling. We express our heartfelt gratitude to everyone who attended the Quest & One Identity forum for customers and partners in Sofia. Your presence and enthusiasm made this event truly exceptional; Stay tuned for more exciting updates and future events!

Gallery

Share:

More Articles:

Heimdal_Case Study_JYSK

Heimdal® Case Study: JYSK

INTRODUCTION Company: JYSK Number of employees: Over 26 500 Global presence: Worldwide Website of the company: https://JYSK.dk/ Year founded: 1979 Industry: Home Retail JYSK A/S

Contact us

Contacts

If you need technological expertise, as well as discussing project ideas, please contact us

IT решения, които работят за Вас:
безгрижно, сигурно и ефективно, всеки ден!

Връзка с нас:

Последвайте ни:

IT решения, които работят за Вас:
безгрижно, сигурно и ефективно, всеки ден!

Меню

Използваме бисквитки

Този сайт използва “бисквитки” (cookies) за подобряване потребителското изживяване. 

IT solutions that work for you:
carefree, safe and efficient, every day!

Contact us:

Follow us:

IT solutions that work for you:
carefree, safe and efficient, every day!

Menu

We use cookies

This site uses cookies to improve user experience.