Webcast: Full-Circle Zero Trust: Ensuring No App is Left Behind in your IAM Strategy

Subscribers:
98,700
Published on ● Video Link: https://www.youtube.com/watch?v=hWkqYkjKV8Y



Category:
Show
Duration: 52:15
392 views
4


Presenter: Matthew Chiodi, Chief Trust Officer, Cerby

While the importance of a zero trust strategy is well-known, practical implementation often stumbles when faced with nonstandard and disconnected applications. This session moves beyond identifying gaps, offering a forward-looking blueprint to bring every application, irrespective of its native support for identity standards, under zero trust. We’ll dissect IAM best practices like granting business owners precise access control, establishing rigorous request and approval workflows, and leveraging automated provisioning and deprovisioning for seamless inclusion. We’ll also discuss how regular recertification fits into a dynamic, all-encompassing zero trust architecture. Attendees will leave equipped with an understanding of potential risks and a clear action plan to mitigate them, ensuring that no application remains an outlier in their zero trust strategy.

See more RSAC Webcasts here: https://www.rsaconference.com/library#sort=%40industrytopiccontentdate%20descending&numberOfResults=25&f:contenttype=[webcast]




Other Videos By RSA Conference


2024-07-12Podcast: Guardians of Cybersecurity: Deploying IoT Devices via Drones and Dropboxes
2024-07-03Fianu Pitch - RSAC 365 Innovation Showcase: Building a Holistic Approach to DevSecOps
2024-06-26Fianu Pitch - RSAC 365 Innovation Showcase: Building a Holistic Approach to DevSecOps
2024-06-26RSAC 365 Innovation Showcase: Building a Holistic Approach to DevSecOps
2024-06-25Leadership Panel - RSAC 365 Virtual Seminar: Infrastructure Security
2024-06-25Traditional Sessions - RSAC 365 Virtual Seminar: Infrastructure Security
2024-06-25Closing Celebration with Alicia Keys
2024-06-25RSA Conference 2024 Opening Keynote
2024-06-25Exploring the Universe, Quantum Bit by Quantum Bit
2024-06-25Webcast Clip: NIST Cybersecurity Framework v2.0, explained
2024-06-17Webcast: Full-Circle Zero Trust: Ensuring No App is Left Behind in your IAM Strategy
2024-06-10The Price is WRONG - An Analysis of Security Complexity
2024-06-10What Hacking the Planet Taught Us About Defending Supply Chain Attacks
2024-06-10AI, the Software Supply Chain, and Other (Not So) Puzzling Pieces
2024-06-10Unveiling the Secrets of Codesys V3: ZeroDays, Forensic Artifacts and More
2024-06-10A Walkthrough: AppSec Tool Selection, Procurement, and Implementation
2024-06-10The Cybersecurity of Smart ‘Adult’ Toys, or Lack of It
2024-06-10IP Protection and Privacy in LLM: Leveraging Fully Homomorphic Encryption
2024-06-10Cloud-Enabling the Electric Grid with Consequence Driven Approaches
2024-06-10Use Generative AI to End Your Love/Hate Relationship with DLP
2024-06-10Your Cybersecurity Budget Is a Horse’s Behind



Tags:
rsa
rsaconference
rsac
information
security
cybersecurity
infosec