YoVDO

Full-Circle Zero Trust: Ensuring No App is Left Behind in IAM Strategy

Offered By: RSA Conference via YouTube

Tags

Identity and Access Management Courses Cybersecurity Courses Risk Management Courses Access Control Courses Application Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive zero trust strategy implementation in this 52-minute webcast from RSA Conference, presented by Matthew Chiodi, Chief Trust Officer at Cerby. Delve into practical solutions for integrating nonstandard and disconnected applications into your Identity and Access Management (IAM) framework. Learn how to grant business owners precise access control, establish rigorous request and approval workflows, and leverage automated provisioning and deprovisioning for seamless inclusion. Discover the importance of regular recertification in maintaining a dynamic, all-encompassing zero trust architecture. Gain insights into potential risks and acquire a clear action plan to mitigate them, ensuring every application aligns with your zero trust strategy. Leave equipped with the knowledge to implement a forward-looking blueprint that brings all applications under the zero trust umbrella, regardless of their native support for identity standards.

Syllabus

Webcast: Full-Circle Zero Trust: Ensuring No App is Left Behind in your IAM Strategy


Taught by

RSA Conference

Related Courses

Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Bases de données relationnelles : Comprendre pour maîtriser
Inria (French Institute for Research in Computer Science and Automation) via France Université Numerique
Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera
Web Application Development: Security
University of New Mexico via Coursera
Computing, Storage and Security with Google Cloud Platform
Google via Coursera