The ability to know WHO has access to WHAT in any environment is a vital tool in this day of cyber espionage and hacking warfare. Especially considering all those contractors and non-employees granted God like access to your computers and systems. Who is watching them to make sure access is revoked upon completion of their contractual engagement? What ARE they doing with the keys to your kingdom? This session will provide the basic building blocks required to stand up an Identity and Access Management (IAM) solution by defining IAM terminology, describing how IAM fits into the security realm, presenting best practices defined by the IAM community, and sharing compelling war stories from active duty on the battlefield. (I don’t understand?! Why doesn’t a Taco Bell receipt count as a signed security agreement?) Come see what IT IAM is doing and protect those keys to your kingdom!