Frank Briguglio | Public Sector Identity Governance Strategist
SailPoint Technologies Inc

Frank Briguglio, Public Sector Identity Governance Strategist, SailPoint Technologies Inc

Frank Briguglio is a recognised thought leader and authority in Identity Governance and Administration (IGA), and Authentication & Access Control. Throughout his career he has been involved in the design and implementation of identity-centric technologies and the development of identity standards. Most recently, he was the Lead Architect for the DHS CDM Program CREDMGMT Task Order and has been instrumental in the convergence of ancillary Federal programs and standards. Frank has supported the Identity, Credential and Access Management Subcommittee (ICAMSC) as a Subject Matter Expert and was involved in the development of the FICAM Roadmap; the Federal and DoD Public Key Infrastructure (PKI) and Federated Identity Standards adopted by FICAM E-Authentication program.
Frank has over 23 years’ experience supporting Federal Civilian, Department of Defence, and the Intelligence community in the deployment of identity and security solutions. He has worked for industry leaders in the Security, Identity and Access Management market - Oracle, Microsoft, Netscape | Sun Microsystems, Deloitte and is currently the Public Sector Strategist at SailPoint.
Prior to his career in Enterprise Security and Identity Management he served in the United States Navy as a Cryptologist where he supported Fleet and National Consumers of Intelligence information.


Day 1 @ 11:25

Protecting Critical Infrastructure through IAM & PAM: Establish Governance & Reduce Vulnerability for Privileged Access

Between growing security threats and evolving compliance mandates and regulations, such as the NIST Cybersecurity Framework, agencies are facing increased pressure to update and secure their aging infrastructure and networks. In this discussion, industry experts will share why an integrated identity access governance and privilege management strategy is at the core of a strong cybersecurity program, the framework for developing a successful program, and how to avoid common pitfalls when deploying these types of solutions.

Day 2 @ 11:00

Achieving Zero Trust with a Strong Identity Governance and Privilege Strategy

last published: 08/Aug/19 07:15 GMT
last published: 08/Aug/19 07:15 GMT

back to speakers