Access Control: Keeping your friends close and an eye on your not so friendlies

Presented by

Dr Michael H. Goldner, Dean of EC-Council University, EC Council University

About this talk

Who is your gatekeeper? Are they trustworthy? Value for most enterprise operations and even small business lies in their infrastructure and accumulated data. The challenge in today’s world is protecting these assets and keeping them safe, without making your facility and process so obtrusive that it is impossible to conduct the activities of the business. How do you insure that these are safe? The simple answer is “Access Control” . Controlling who has access to the assets of your business, when and where, is of prime concern for any IT/IA professional. This workshop will review the various methodologies that are used to achieve that goal, their levels of assurance, and the cost and ease of implementing them.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (657)
Subscribers (13396)
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security. Due to our partnerships, we are able to offer discounts on some of the most popular security certifications and training courses, including CEH, CISSP, CCISO, and more. www.infosec-careers.com This BrightTALK channel is an extension of the group and the ISCN website (www.infosec-careers.com), featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after. Key areas: InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more