Secure Access And Authorization: Keeping Precious Resources Safe From Prying Eyes And Bad Actors

Channel:
Subscribers:
4,690
Published on ● Video Link: https://www.youtube.com/watch?v=VZPCuwUg2QY



Duration: 49:35
24 views
5


Your organization has precious resources all over the place: on-premises in the data center on servers and in databases; in the office, at home, on the road on desktops, laptops, tablets, mobile phones, and smart devices; in the cloud inside containers, applications, and a variety of storage services. Assuming you have identified and verified the person and/or system and/or service as a valid entity, how do you ensure they only have access to these resources, when they need them, from the location they need them, from the system they are requesting them, and at the time they are requesting them? This challenge is much more complex than ensuring a user is set up in the directory and has entered a valid password. That’s what this discussion is going to be all about.

Join us for this session as we explore the following points:

◾️ What does “secure access” mean to security, to ops, to the users, to the business?
◾️ Does the conversation and language need to change between groups?
◾️ How and where is secure access managed?
◾️ How to deal with the systems, applications, and data?
◾️ How does it fit in with Risk Management and SecOps?
◾️ What are some key challenges orgs face?
◾️ What are some of the core elements many orgs leave out?
◾️ Are there processes and/or tools to make things easier?
◾️ Any best practices or tips to simplify the program?

____________________________

Guests
Shinesa Cambric
Identity Champion at Identity Defined Security Alliance [@idsalliance] | Principal Product Manager for Emerging Identity at Microsoft [@Microsoft]
On LinkedIn | https://www.linkedin.com/in/shinesa-cambric-cissp-ccsp-cisa®-0480685/
On Twitter | https://twitter.com/Gleauxbalsecur1

John Sapp Jr
VP, Information Security & CISO at Texas Mutual Insurance Company [@texasmutual]
On LinkedIn | https://www.linkedin.com/johnbsappjr
On Twitter | https://www.twitter.com/czarofcyber

____________________________

This Episode’s Sponsors

Imperva: https://itspm.ag/imperva277117988

HITRUST: https://itspm.ag/itsphitweb

____________________________

Resources

Identify Defined Security Alliance Best Practices: https://www.idsalliance.org/identity-defined-security-framework/best-practices/

Enterprise Risk - Engaging Others: https://www.isaca.org/resources/isaca-journal/issues/2020/volume-5/addressing-risk-using-the-new-enterprise-security-risk-management-cycle

____________________________

Catch the on-demand live stream video and podcast here: https://www.itspmagazine.com/live-panels/secure-access-and-authorization-keeping-precious-resources-safe-from-prying-eyes-and-bad-actors-redefining-cybersecurity-with-sean-martin

To see and hear more Redefining Security content on ITSPmagazine, visit:
https://www.itspmagazine.com/redefining-cybersecurity

Are you interested in sponsoring an ITSPmagazine Channel?
👉 https://www.itspmagazine.com/podcast-series-sponsorships




Other Videos By ITSPmagazine


2022-05-23A Recognized Security Practice And Safe Harbor | A HITRUST Story w/ John Houston And Michael Parisi
2022-05-23RSAC 2022 | A BlackCloak Story About Supply Chains, Hacking Back, And MySpace With Dr Chris Pierson
2022-05-19Securing Bridges | A Live Stream Podcast With Alyssa Miller | Guest: Olivia Snow | Episode 10
2022-05-14The Ultimate Live Stream Broadcasting Stack | KnightLife On ITSPmagazine w/ Alissa Valentina Knight
2022-05-12Securing Bridges | A Live Stream Podcast With Alyssa Miller | Guest: Andra Zaharia | Episode 9
2022-05-10Governance, Risk, And Compliance: Protecting The Business With Policies, Controls, And Audits
2022-04-30Knowledge Is Different Than Information | A CrowdSec Story With Philippe Humeau And Phillip Wylie
2022-04-28Securing Bridges | A Live Stream Podcast With Alyssa Miller | Guest: Alissa DNSPrincess | Episode 8
2022-04-21What To Expect At RSA Conference USA 2022 | w/ Linda Gray Martin, Britta Glade, And Cecilia Marinier
2022-04-21Securing Bridges | A Live Stream Video Podcast With Alyssa Miller | Guest: Andy Ellis | Episode 7
2022-04-19Secure Access And Authorization: Keeping Precious Resources Safe From Prying Eyes And Bad Actors
2022-04-14Securing Bridges | A Live Stream Video Podcast With Alyssa Miller | Guest: Simon Maple | Episode 6
2022-04-07Securing Bridges | A Live Stream Video Podcast With Alyssa Miller | Guest: Jeff Man | Episode 5
2022-03-31Securing Bridges | A Live Stream Podcast With Alyssa Miller | Guest: Wolfgang Goerlich
2022-03-29Business Continuity: Building And Operationalizing A Functional Disaster Recovery Plan
2022-03-25Time to talk about tech and have some fun with George Platsis | Join us as we record live!
2022-03-24A Conversation With Jules Okafor | Securing Bridges With Alyssa Miller | Episode 3
2022-03-22Creating A Data Security Strategy And Operationalizing A Mature Data Security Program
2022-03-18Guest Angela Marafino | Live Recording With Video | Through The TechVine Radio Program
2022-03-17Securing Bridges | A Live Stream Video Podcast With Alyssa Miller | Guest: Accidental CISO
2022-03-16Smart Cities | Episode 3 | With Dr. Jonathan Reichental