У нас вы можете посмотреть бесплатно Identity Protection Beyond Borders –Disrupting Shadow Access Across the Cloud - Shinesa Cambric или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
In today’s digital reality, we are increasingly integrated and interconnected with those we know (and don’t know) - and what we think of as “identity” is evolving. Identity and Access Management has been a foundational aspect of data security for decades, but is faced with a tectonic shift in processes and solutions. As the information technology landscape has moved from on-prem to cloud, the security measures that IAM provides must also evolve. The widespread use of cloud services and the increase in data-centric applications has led to the proliferation of identities and the footprint of identity risk now goes beyond compromised employees to include contractors, suppliers, guest accounts, and even the identity of "things" (devices, bots, APIs), introducing a new problem of Shadow Access - the unauthorized, unregulated, and invisible access to cloud data, applications, and software putting companies at risk. In this session we will talk about this changing landscape of identity and the processes and protections you need to put in place to build an “Identity-in-Depth” strategy that goes beyond looking at employee identities but assesses your entire identity ecosystem for what may be lurking in the shadows.