On Demand Webinar

Automating Attestation: A Critical Step in Security Risk Management

Automating Attestation: A Critical Step in Security Risk Management

Andy Smith (Centrify), Allen Moffett (Atos); Eric Uythoven (LexisNexis Risk), James Carder (LogRhythm)

As the number of identities an organization manages explodes, making sure the right resources (human and non-human) have the right access can be overwhelming. Whether driven by compliance requirements or security risk management, attestation processes can provide periodic visibility into dynamically changing access – who has access, who granted it and who approved it. Automating those processes is a critical step to keeping access rights in line with the principle of least privilege and more importantly, can be automatically triggered as a result of a high-risk event.

In this panel, part of the Security Outcome Deep Dive Series, identity and security experts will provide real world examples about the role of attestation processes in a security risk management program, the key stakeholders involved and how it can be achieved using technologies that may already be deployed

Note: The IDSA is an approved (ISC)2 CPE Submitter Partner. To receive CPE credits, submit the viewing certificate to (ISC)2 or submit your information. Make sure to check out our other identity-centric security webinars from leading identity and security experts.

Related Webinars

On Demand Webinar

On Demand Webinar

It All Comes Back to Access: How to Establish Cloud Identity Security in 2024

Member Sponsor

On Demand Webinar

On Demand Webinar

The Broken State of Least Privilege: Reimagining a New Approach

Member Sponsor

On Demand Webinar

On Demand Webinar

Use Identity Convergence to Collaborate More Securely With External Partners

Member Sponsor
Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.