Building Practical IGA in the Cloud Era (Richmond, September 26)
Identity Governance and Administration (IGA) and Privileged Account Management (PAM) need a makeover for cloud computing. During a recent consulting engagement, I took a deep dive into Cloud IGA and Cloud PAM. I’ll be sharing my perspectives over the next… Continue reading
The Rise of Identity, Access and Authentication in Security Webinar
Why is identity perhaps the most critical security subject matter domain today? What do you think? Hint: Take a look at the consequences and causes of most breaches. Also, tune in to hear me cover the subject at 10:00… Continue reading
Mastering Hybrid Active Directory Auditing Webinar: June 11
Hybrid Active Directory Auditing seems like a topic no one is covering – until now! Please sign up with BeyondTrust for my June 11, 2019 | 1:00 PM – 2:00 PM ET webinar to learn more.
All too often… Continue reading
Active Directory Audit: Why and How
Why is 1:00 PM EST March 26 important? That’s when I’ll be presenting an Active Directory Audit webinar. The figure below features some of the issues I’ll be covering that motivate audit. A brief description of the webinar follows.… Continue reading
Infosecurity Magazine Online Summit North America: IAM Panel on March 27
I’ll be speaking at the Infosecurity Magazine Online Summit North America on an IAM panel at 3:00 PM EST March 27. I’ll be on with Diana Kelley (Cybersecurity CTO, Microsoft) and Paul Simmonds (CEO, Global Identify Foundation).
Join us… Continue reading
The Pros and Cons of using Blockchain in Financial Services
Webinar Title: Blockchain or Bust? The Pros and Cons of using Blockchain in Financial Services
Webcast Live Date & Time: 8:00 am PST / 11:00 am EST Mar 12 2019 United States
Duration: 60 mins
The New Vulnerability and Risk Management (VRM) Paradigm: Holistic, Dynamic, Adaptive
The ability to perform effective Vulnerability Risk Management (VRM) is an important marker of IT security maturity. Why? Managing the flow of vulnerabilities in complex IT environments is a major challenge. So is recognizing, categorizing, and prioritizing IT security risks.… Continue reading
DIY Access Control Pitfalls Webinar Featuring Dan Beckett
DIY access control can be problematic. Dan Beckett will be co-presenting with Axiomatics’ Gerry Gebel on:
Hidden Pitfalls of Do-It-Yourself Access Control Development and How to Avoid Them
Wednesday, September 26, 11:00am PST | 1:00pm CST | 2:00pm EST
Register… Continue reading
Blockchain and Decentralized Identity Presentation for ISACA GWDC Chapter
Security Architects Partners’ Dan Blum will be speaking September 20, 8:30 AM, at the ISACA Greater Washington DC Chapter’s Cybersecurity and Risk Conference (Register). Here is the presentation abstract:
Blockchain Technology and Concepts of Decentralized Identity
Blockchains are… Continue reading
Announcing New Partner, Webinar, and Going to IdentiVerse
In June doings for Security Architects Partners – it’s a busy month! We’re excited for Identiverse where I’ll be attending in my role of free lance KuppingerCole analyst. The figure below says it all; contact us if you’d like… Continue reading