IAM Implementation & Cybersecurity Considerations

Recently I had to present my personal thoughts on how we should implement a hybrid IAM scenario and the Cybersecurity considerations we should have when doing so. Attaching my slideshow with some thoughts. Let me know if any queries.