IT Architecture Practitioners Conference  Europe 2006, Barcelona, Spain The open Group Real IRM
You are here:  Home > Events > IT Architecture Practitioners Conference Cape Town
  Angeli Hoekstra, Partner, IT Effectiveness Solutions, PricewaterhouseCoopers    
Angeli HoekstraAngeli is a director in the Advisory Practice of PricewaterhouseCoopers and has worked for PricewaterhouseCoopers since 1991, first for the Amsterdam office in the Netherlands, and since 1997 for the Johannesburg office. PricewaterhouseCoopers (http://www.pwc.com) is the world’s largest professional services organisation.

The Advisory Practice in South Africa, has over 800 professionals, and offers comprehensive risk management, governance, crisis management, transactions and process improvement services.

Angeli is within Southern Africa nationally responsible for the IT Effectiveness & Technology Service Lines. This solution set comprises the provision of the following services to our clients:

  • Strategic IT Solutions in the areas of:
    IT strategy, IT architecture, Contact Centres, Sourcing, IT Benefits Tracking and IT Mergers & Acquisition.
  • Governance and IT Management Solutions in the areas of:
    IT Cost & Value Management, IT Governance, IT Service Management, IT Human Capital and IT Asset Management.
  • IT Risk Management Solutions in the areas of:
    Identity Management, Threat & Vulnerability Management, Security Governance and Role Engineering.

Within PricewaterhouseCoopers, Angeli is globally responsible for the provision of IT Governance Services. Furthermore, she is part of the global IT Effectiveness and Technology Leadership Teams.

 

   
 

Presentation
Identity Management and Enterprise Architecture
Angeli Hoekstra will discuss identity management concepts and touch points within the different enterprise architecture domains.

By using an Identity Management (IdM) solution, an organisation can ensure that the right people get the right access at the right time. An integrated IdM solution identifies the user, determines what the user can do, determines the privileges the user should receive, protects the organisation’s resources and sends alerts should information have been compromised. According to Angeli, this is critical because users are working on many different systems and accessing data from multiple locations that all have different passwords and authorisations. In addition, every time a customer, vendor or employee changes, the cumbersome process of adding or deleting privileges begins. This wastes staff time and drives costs up. An Identity Management system provides a solution for managing all these different access rights and has touch points in different enterprise architecture domains.

return to program

 

   
   |   Legal Notices & Terms of Use   |   Privacy Statement   |   Top of Page   Return to Top of Page