Access vs Actions, Beyond Traditional IGA, Remote Identity Verification, & Fraud - Tim Prendergast, Damon Tompkins, Andrew Bud, Chris Meyer - ESW Vault
21 June - 58 minsTraditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approach to modern enterprise security requires a Zero Trust model that extends beyond just access to encompass every action, no matter how minor.
Tim will describe the importance of implementing a Zero Trust framework that evaluates each command, query, and configuration change in real-time, and how that delivers the most effective and complete security solution. Doing so involves the application of fine-grained authorization policies that adapt to the context of the user, the sensitivity of the action, and the prevailing threat landscape.
Segmen...
Secure By Default - How do we get there? - Andy Syrewicze - PSW #848
3 hours 6 mins
24 October Finished
Doom Brain, E2EE, OT, Adload, Cisco, VMware, internet archive, Josh Marpet ... - SWN #424
29 mins
22 October Finished
Aligning Tech Execs on Cyber Resilience - Theresa Lanowitz - BSW #369
1 hour 1 min
22 October Finished
The Complexities, Configurations, and Challenges in Cloud Security - Scott Piper - ASW #304
1 hour 17 mins
21 October Finished
Stealing, Kubernetes, Passkeys, SolarWinds, Intel, Sextortion, and... - SWN #423
33 mins
18 October Finished
Cybersecurity Success is Business Success - Renuka Nadkarni, Theresa Lanowitz - ESW #380
1 hour 46 mins
18 October Finished