Reveal

Grant Reveal

Senior Manager, Information Security

Entergy Corporation

As an experienced information security professional, Grant has worked across multiple disciplines including cloud, infrastructure, architecture and identity with experience in Fortune 500

organizations building and leading Identity Programs. Grant has held various IT leadership roles including CTO and CIO prior to becoming more singularly focused in information security. This broad experience enables Grant to discuss organizational and operational risk in terms of the business and equip senior leadership to make well informed decisions regarding the risk profile of their organizations. Grant’s experience encompasses health care, higher education, global manufacturing, banking and finance as well as the utility space. He has led IAM and security architecture teams and was selected as one of Security Magazine’s Most Influential People in Security

for 2019. His current certifications include CISSP, CCSP and CISM.

Sessions

Digital Strategy: Future-Proof Security, Safety and Data Privacy in the Age of Digital Transformation

Thursday, June 4th
1:20pm2:00pm
 
Security, safety and data privacy have traditionally been addressed in disconnected way across many systems and organizational silos, resulting in unmanageable complexity, overlaps, inefficiency, cost and risk. This session explores how Identity is becoming the way to manage convergence across all areas of an organization to ensure compliance, mitigate risk and enhance security. This session will also cover how emerging trends like cloud, the Internet of Things and digital transformation can be leveraged to address this huge problem and how forward-looking organizations are trail blazing the path to achieve their vision of future proofing security, safety, data privacy and making security a true business enabler, including:
  • A reference design that government agencies and programs can use to increase security and efficiency in managing access to their interconnected devices and facilities
  • How a converged identity and access management (IdAM) system allows rapid provisioning and de-provisioning of access from a centralized platform, so utility personnel can spend more time on other critical tasks
  • How these reference designs can help improve a government agencies and programs security posture by tracking and auditing access requests and other IdAM activity across all networks