Track Moderator at KuppingerCole EIC Conference
Looking forward to an action packed KuppingerCole European Identity Conference, or EIC.
Participating on the Analyst Panel “Connected Consumers, Internet of Things, Blockchain, Robotics & more: Shaping the Future of IAM”: It will great to revisit this topic,… Continue reading
Optimizing Security Investment Through a Business Case (Part 2)
Optimizing security investment? Every organization needs at some point to determine whether a particular security investment (or expense) is justified by a business case. As discussed in Part 1 of our security business case series, even quantifying expected losses… Continue reading
Security Business Case for Breach Risk Reduction (Part 1)
Security business case justification is always a complex task for two reasons. First, security earns its keep by reducing risk of losses, not by producing revenues. Second, estimating both the size of losses to security incidents, and the extent… Continue reading
April 12 Webinar: The CISO’s Guide to Planning for ABAC Success
ABAC, Attribute Based Access Control, is the new model for access control as identified by NIST and Gartner, to help organizations meet the needs of the evolving complexities of today’s business environments.
Security Architects Partners is partnering with Axiomatics to… Continue reading