And There You Have It!
Pillar Six: Identity and Access Management [Six Pillars of Security]
- Author: Vários
- Narrator: Vários
- Publisher: Podcast
- Duration: 0:10:47
- More information
Informações:
Synopsis
In this episode about identity and access management (IAM), Cherie and Matt discuss: Why it’s critical to know what “normal” looks like for your data How micro breaches can be just as damaging as major ones The importance of examining all IAM practices for improvement, not just the “broken” ones What security professionals can learn from insider threats, like the infamous Edward Snowden breach With a comprehensive security strategy, IAM technology can generate the intelligence you need to increase your understanding of broader security events and advance your overall security posture. Join Forsythe’s host Cherie Caswell Dost, formerly of Chicago Public Radio, and industry expert Matt Sickles, director of consulting services, Forsythe Security Solutions, for a multi-episode series of our podcast, And There You Have IT. In this six-part series, “The Six Pillars of Security," we explore how companies can stay agile and secure in the face of an ever-evolving threat landscape. Listen to the podcast series to exp