Rational Cybersecurity Webcast: Applying the 80-20 Rule
As I worked on Rational Cybersecurity for Business, I became fascinated with this question: How can we find a way to gain 80% of the benefits for 20% of the work? Considering that cybersecurity has so many moving parts… Continue reading
How can Cybersecurity Architecture Align Modern Business and Technology Concerns?
Cybersecurity architecture can show help us align business and technology concerns by providing modernized views of core processes and technologies. Today, that means focusing on a hybrid, multi-cloud IT environment. To really deep dive on this, please sign up for… Continue reading
How to Protect Privileged Access: Back to the Basics
Privileged access management (PAM) is a cornerstone of zero architectures and other efforts to shore up defenses against an increasingly insecure network edge and elevated danger from threat actors. Please register here to join our webcast Thursday June 17 at… Continue reading
Which is Easier: Aligning Business to Security, or Security to Business?
Which is Easier: Getting Businesspeople to think in terms of Security, getting Security Teams to think in terms of Business? While security leaders should work both angles, I say the correct answer to Alyssa Miller’s original question (below) is “B”.… Continue reading
Pathways to Unified Endpoint Management (UEM)
Would you like to learn more Unified Endpoint Management (UEM) – and of course security – strategies? If so, please register for my November 12 webinar!
Title: Pathways to Unified Endpoint Management (UEM)
The Expanding Universe of Privileges: Why Cloud PAM Matters (Webcast)
Would you like to learn how Privileged Account Management (PAM) systems should cover cloud environments? If so, please register for my September 17 webinar!
Title: The Expanding Universe of Privileges: Why Cloud PAM Matters (Webcast)
Enterprise Cloud Security: Defending the Digital Lifeline (Webcast)
How to Reduce Third Party Access Risk (Webcast)
Do you think your organization should be doing something differently to control third party access risk? If so, please register for my webcast on April 16!
Is PAM the Weakest (Missing) Link in Your Cloud Security Strategy? (Webcast)
Do you think privileged access management (PAM) for cloud services, DevOps, and service accounts may need improvement? If so, please register for my webcast on October 23!
Audit Active Directory to Reduce Risks from Privileged Users (webcast)
Do you think that Active Directory privileged management practices may pose risks to your organization? If so, please register for my webcast on September 12!