Skip to content

Details

s your directory lying, owners guessing and NHI's multiplying?

We talking administrative & runtime controls including identifying & removing dormant identities, detecting non-admin registered enterprise applications, detecting rogue accounts, reconciling orphan accounts, discovering and remediating clear text credentials, discovering unmanaged privilege access & just in time controls for privileged access.

Guest Andrew Dutton bringing into practice risk based access reviews, remediating excess access and a program built for continuous adaptive trust and risk based authorization.

Similar format as previous. Zoom combined with different locations. Podcast recording. Participation very encouraged.

Will not be boring.

Cloud Security
Digital Identity
Federated Identity
Identity & Access Management
Information Security

Members are also interested in