Cybersecurity architecture can show help us align business and technology concerns by providing modernized views of core processes and technologies. Today, that means focusing on a hybrid, multi-cloud IT environment. To really deep dive on this, please sign up for… Continue reading
Would you like to learn more Unified Endpoint Management (UEM) – and of course security – strategies? If so, please register for my November 12 webinar!
Title: Pathways to Unified Endpoint Management (UEM)
Would you like to learn how Privileged Account Management (PAM) systems should cover cloud environments? If so, please register for my September 17 webinar!
Title: The Expanding Universe of Privileges: Why Cloud PAM Matters (Webcast)
Do you think your organization should be doing something differently to control third party access risk? If so, please register for my webcast on April 16!
Do you think privileged access management (PAM) for cloud services, DevOps, and service accounts may need improvement? If so, please register for my webcast on October 23!
Do you think that Active Directory privileged management practices may pose risks to your organization? If so, please register for my webcast on September 12!
Identity Governance and Administration (IGA) and Privileged Account Management (PAM) need a makeover for cloud computing. During a recent consulting engagement, I took a deep dive into Cloud IGA and Cloud PAM. I’ll be sharing my perspectives over the next… Continue reading