Full-Circle Zero Trust: Ensuring No App is Left Behind in IAM Strategy
Offered By: RSA Conference via YouTube
Course Description
Overview
Explore a comprehensive zero trust strategy implementation in this 52-minute webcast from RSA Conference, presented by Matthew Chiodi, Chief Trust Officer at Cerby. Delve into practical solutions for integrating nonstandard and disconnected applications into your Identity and Access Management (IAM) framework. Learn how to grant business owners precise access control, establish rigorous request and approval workflows, and leverage automated provisioning and deprovisioning for seamless inclusion. Discover the importance of regular recertification in maintaining a dynamic, all-encompassing zero trust architecture. Gain insights into potential risks and acquire a clear action plan to mitigate them, ensuring every application aligns with your zero trust strategy. Leave equipped with the knowledge to implement a forward-looking blueprint that brings all applications under the zero trust umbrella, regardless of their native support for identity standards.
Syllabus
Webcast: Full-Circle Zero Trust: Ensuring No App is Left Behind in your IAM Strategy
Taught by
RSA Conference
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network