Harnessing Privileged Access Management (PAM) to Defend Core Digital Assets Against a Breach
How do you manage the risk of privileged accounts being compromised, breaching your organization? PAM can reduce risks by hardening your environment in ways no other solution can, but is challenging to deploy. This webinar provides an unbiased perspective on PAM capabilities, lessons learned and deployment challenges, distilling the good practices you need to be successful:
Regaining the Defensive Advantage (May 21, 2015)
In military doctrine from Sun Tzu to Clausewitz, defenders had the advantage over attackers. But in the cyberspace realm, we’ve lost our edge. What can we do? As security breaches proliferate, this question become critical. This webinar covers how organizations can:
Security Governance For Higher Education (April 9, 2015)
Cyberattacks on higher education institutions are increasing and succeeding. On this webinar, Principal Consultant Dan Blum and Dr. Tom Johnson (Webster University) discuss governance and protection issues for institutions and recommend a series of actionable steps – including but not limited to governance improvement – to correct this situation.
Security Governance 101: Choosing Models and Structures (February 11, 2015)
Even on technical consulting engagements, Security Architects Partners often finds that a security governance issue is at the root of the problem we were brought in to solve. Therefore, we’ve developed a set of models and principles to help organizations determine what should be shared, or centralized, what should be de-centralized and how to set up and operate matrix models.