Senior Director, Strategic Consulting, IDM; Optiv
Janel Schalk, Senior Director in Optiv’s Advisory Solutions practice for the Identity and Data Management (IDM) team, has worked for Optiv since October 2012. Janel’s role is to manage the Strategic Consulting and Access Management solution areas and team members at a global level, provide engagement oversight and experienced consulting to Optiv’s clients, develop new key offerings, support sales initiatives, and provide support and mentoring to other Optiv team members, while developing and maintaining relationships with trusted vendors and delivery partners.
Janel has over 17 years of experience in the security field. Her career includes involvement with Identity and Data Management (IDM) programs, security and privacy program re-engineering, designing and implementing attribute and role based security and programs, external auditing of IT systems, Certification and Accreditation (C&A) initiatives, and standing up self-assessment programs. Janel builds solid relationships with stakeholders, reaching consensus across multiple business units and organizational levels. She also has considerable experience coordinating and managing domestic and international resources.
Wednesday, June 26
2:00 - 2:50 pm Georgetown
Optiv Presents: Customer Identities and Data Customer Identity and Access Management (CIAM) is a complex undertaking. Considerations must be made for not just who our customers are but how they interact with our companies, the products and services they’re buying, and how we can best protect their data while enabling them to do the things they need to do in the variety of ways they do. During this panel, moderated by Aubrey Turner, we’ll discuss a comprehensive approach to CIAM and some associated pain points and pit falls we’ve seen across industries.
Tuesday, June 25
8:15 - 9:05 am Georgetown
Optiv Presents: Zero Trust and Identity-Defined Security 81% of hacking related breaches leveraged either stolen and/or weak passwords.* Despite this startling statistic, organizations are still heavily reliant on passwords to secure critical data and infrastructure. Instead of building a security strategy solely on passwords, organizations need to adopt the notion of zero trust identity where no individual or device is trusted on the network. This Panel, moderated by Robert Block, will provide the five essential components of a zero-trust identity model and how you can implement it by integrating the IAM and security tools deployed today.
*Verizon’s 2017 Data Breach Investigations Report
Enter your details to receive email updates from Identiverse