Helping CISOs and Board Members Communicate on Risk: A Shared Assessments Summit 2019 Recap
Returning from the Shared Assessment Summit 2019 last week, I was struck by one repeated message: CISOs and Board of Directors members are still struggling to assess and communicate risk. Early in the Summit Agenda, a CISO Panel discussion… Continue reading
Periodic Newsletter Update
We’re writing to share our news, and to update our newsletter subscribers on an improvement we’ve made to the distribution system.
News: We’re keeping busy with a mix of risk management program development, identity management, and data leakage prevention… Continue reading
Dan Blum to Speak at ForgeRock NYC Identity Summit
I’ll be headed back to the Big Apple – the city of my birth where it all began – to the ForgeRock Identity Summit: Building Digital Trust with Digital Identity.
It will be great to be in the… Continue reading
May 19 Webinar: Dan Beckett on Toxic Pairs, Role Explosion, and the Evolution of RBAC
It’s 2016 and the days of Sherlock Holmes are long gone. Yet mysteries and puzzles abound more than ever in our increasingly complex world. IT is no stranger to these complexities. Managing access control and entitlements has… Continue reading
Track Moderator at KuppingerCole EIC Conference
Looking forward to an action packed KuppingerCole European Identity Conference, or EIC.
Participating on the Analyst Panel “Connected Consumers, Internet of Things, Blockchain, Robotics & more: Shaping the Future of IAM”: It will great to revisit this topic,… Continue reading
April 12 Webinar: The CISO’s Guide to Planning for ABAC Success
ABAC, Attribute Based Access Control, is the new model for access control as identified by NIST and Gartner, to help organizations meet the needs of the evolving complexities of today’s business environments.
Security Architects Partners is partnering with Axiomatics to… Continue reading
April 26: Dan Beckett Speaking at ISACA Chapter Event
Cyber-Resilience and privileged access management (PAM) will be front and center April 26, 2016 at ISACA’s Central Arkansas Chapter with a full-day seminar from Dan Beckett, one of our Managing Partners.
Two-Part Seminar
Incident Response
Cyber-Resilience in the… Continue reading
Complimentary Webinar: Cyber-Resilience in the Face of a Breach
Two weeks ago I stood before a conference crowd at Cyber Security World 2015 and said: “I hate the term cybersecurity.” And proceeded to give essentially the same presentation that we’ll now bring to all of you through… Continue reading
Safe Harbor is Dead – Now What?
Tuesday October 6, 2015 the European Court of Justice struck down Safe Harbor, an international agreement that allowed companies to move digital information between the the United States and Europe. According to a New York Times article, “… Continue reading
Critical Infrastructure Demands Proper Business Continuity Planning
IT is everywhere in critical infrastructure. The Internet. The electrical grid. The banking system. We don’t often think of the nationwide electrical grid (no matter what country you’re in) as a massive exercise in IT, but part of our critical… Continue reading