(ISC)² Security Briefings Part 6: Step 4: Governance and Tying it all Together

Controlling the access of all users, especially privileged ones, is essential not only for risk reduction but also for easier compliance. But, controlling access isn't enough. Organizations need to govern all user access to ensure that no user has more access than they need, and that segregation of duties policies are enforced. On February 9, 2017, CA Technologies and (ISC)² will highlight key aspects of effective identity governance, including for contractors and partners who might have access to your systems. Included in the discussion will be key capabilities and processes to help create leading-edge identity governance deployments that can improve the security of your critical data and simplify compliance audits.

Save my Spot!

Details

  • When

  • Thursday, February 9, 2017
    1:00 PM - 2:00 PM
    Eastern Time Zone

Sponsors

 

CA-1

Top