Identity Governance and Administration (IGA) and Privileged Account Management (PAM) need a makeover for cloud computing. During a recent consulting engagement, I took a deep dive into Cloud IGA and Cloud PAM. I’ll be sharing my perspectives over the next… Continue reading
Hybrid Active Directory Auditing seems like a topic no one is covering – until now! Please sign up with BeyondTrust for my June 11, 2019 | 1:00 PM – 2:00 PM ET webinar to learn more.
All too often… Continue reading
Since launching the Rational Cybersecurity for the Business book project to kick off the New Year, I’ve made great progress, completing more than 20 security leadership interviews, and drafts for 5 of the 10 chapters.
Rational Cybersecurity for the Business’s… Continue reading
Why is 1:00 PM EST March 26 important? That’s when I’ll be presenting an Active Directory Audit webinar. The figure below features some of the issues I’ll be covering that motivate audit. A brief description of the webinar follows.… Continue reading
I’ll be speaking at the Infosecurity Magazine Online Summit North America on an IAM panel at 3:00 PM EST March 27. I’ll be on with Diana Kelley (Cybersecurity CTO, Microsoft) and Paul Simmonds (CEO, Global Identify Foundation).
Join us… Continue reading
RSA CEO Rohit Ghai and former Chief Strategy Officer Niloofar Razi Howe’s keynote today could have been re-titled “Standing in the Bleak Landscape of Zero Trust.” It has become an impediment, they said.
Should I be defensive, having jumped on… Continue reading
Webinar Title: Blockchain or Bust? The Pros and Cons of using Blockchain in Financial Services
Webcast Live Date & Time: 8:00 am PST / 11:00 am EST Mar 12 2019 United States
Duration: 60 mins
There is still a need for network segmentation in the zero trust era, but it needs to be software-defined. Otherwise, traditional network segmentation will be over-whelmed by the growing number of access and component interactions today’s applications require. Late… Continue reading