CA Briefings Part 6: Step 4: Governance and Tying it all Together

Presented by

John Hawley, VP Security Strategy, CA Technologies; Brandon Dunlap (Moderator)

About this talk

Controlling the access of all users, especially privileged ones, is essential not only for risk reduction but also for easier compliance. But, controlling access isn't enough. Organizations need to govern all user access to ensure that no user has more access than they need, and that segregation of duties policies are enforced. On March 21, 2017 at 1:00PM Eastern, CA Technologies and (ISC)2 will highlight the steps for strengthening the enterprise and increasing customer engagement as well as key aspects of effective identity governance, including for contractors and partners who might have access to your systems. Included in the discussion will be key capabilities and processes to help create leading-edge identity governance deployments that can improve the security of your critical data and simplify compliance audits.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (198)
Subscribers (18724)
This channel covers Symantec Privileged Access Management, Symantec Authentication, Symantec Identity Management, and Symantec SiteMinder. We will focus on topics including identity, privileged users, access management and other top cybersecurity trends in the industry.