How to Start: Recertification or Active Access Controls First?

  • LANGUAGE: English DATE: Wednesday, December 09, 2009 TIME: 18:00 - 19:00 CET, 12am Eastern
Upcoming Webinars

What is the best approach to do access governance? Should you start with attestation to understand where the problems are? Or should you first have a management infrastructure in place which allows to control access across different systems and use access governance approaches then to improve the state of your information security? Or is recertification sufficient? Kuppinger Cole analysts and different vendors discuss the strengths and weaknesses of different approaches?

Speakers

Paul Heiden (1967) is BHOLD Company’s founder and CEO. Paul started his career as an officer of the Royal Netherlands Marine Corps specialized in mountain and arctic warfare. Having obtained a master degree in Dutch and Roman law, Paul became legal counsel at KPN, the Dutch...

Watch now

Downloads

Trending Videos

Next Webinar

Webinar

Unify Identity and Security to Block Identity Based Cyber Attacks

Compromised credentials are a top cyber-attack method. Identity-based attacks are on the rise, it is therefore vital that businesses can detect the misuse of enterprise identities to block attackers from getting unfettered insider access to IT systems and data. But that can be challenging in today’s distributed, hybrid, and multi-cloud business IT environment.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00