5 Steps to Move from Audit Logs Towards Integrated, Corporate-Level Security and Identity Audits
Facebook Twitter LinkedIn

5 Steps to Move from Audit Logs Towards Integrated, Corporate-Level Security and Identity Audits

Combined Session
Thursday, May 07, 2009 10:30—11:30
Location: HELIOS

5 Steps to Move from Audit Logs Towards Integrated, Corporate-Level Security and Identity Audits

Sebastian Rohr
Sebastian Rohr
KuppingerCole
Sebastian Rohr has been active as author of multiple articles, reviews and essays on all kinds of security topics. Having a ten year record in IT with a background in network & systems...

From Proprietary Point Solutions to a Centralized Enterprise Security Administration

From Proprietary Point Solutions to a Centralized Enterprise Security Administration
Presentation deck
From Proprietary Point Solutions to a Centralized Enterprise Security Administration
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Vesna Martinovic
Vesna Martinovic
Komercijalna Banka
Vesna Martinovic is currently Head of IT process management unit in Komercijalna Banka, Serbia's largest bank. She is with Komercijalna Banka for over 10 years where she began her career as db...
Subscribe for updates
Please provide your email address