Please join us on Friday, December 4th, 2020 for “Hacking User Access: An hour of critical thinking on managing initial and ongoing access to network and data”.

REGISTER

There are a multitude of technologies (identity access management (IAM), privileged access management (PAM), password management, multi-factor authentication (MFA), single sign on (SSO)) that security professionals deploy to manage user access. We have discussed many of these technologies in the past, but we’re going to use this hour to look at the entire ecosystem of managing user access and how machine learning and artificial intelligence can play a part. 

Joining me for this discussion will be:

In preparation for our discussion, think about the following:

  • Assuming greenfield, how would you begin approaching user access?
  • What aspects of securing user access actually improve business operations?
  • Where are the most notable hiccups in managing user access?
  • How does the user access paradigm change when you’ve got stolen credentials?

It all starts at 10 AM Pacific/1 PM Eastern. At the end of the hour [11 AM Pacific/2 PM Eastern] we’ll switch gears into a series of impromptu 1-on-1 five-minute meetings where everyone will be randomly paired. Nothing to prepare, we’ll do the matching.

Got feedback? Join the conversation on LinkedIn.

Thanks to our sponsor, F5

ALSO…

  • Best bad ideas get first responses in “Department of YES”.
  • The BEST bad idea wins an award and a $25 Amazon gift card.

The CISO Series Video Chats are open discussion where all viewers and listeners are welcome to become participants. Before the scheduled event, connect your webcam and microphone (avoid Bluetooth) and test your equipment here. During the discussion, if you have a question or comment, let it be known in the chat room and our producer will do his best to get as many of you into the conversation. We look forward to you joining us.