• Sponsor Resources
  • Related Resources
  • Classrooms
    • Hybrid Cloud Security
    • Integrating SIEM and Incident Response
    • Targeted Attacks
    • Application Security
    • IoT Security

Lesson 1:


Michael Cobb discusses identity and access management of non-employees and how to control third parties that are less security-minded but still requireaccess to your systems and data.

Enterprise IAM:
Managing Third Parties


Lesson 2:


IAM for employees is tough enough, but recent breaches show InfoSec pros need to apply access controls to third-party vendors too.

Is Third-Party Management
The Next IAM Frontier?


Lesson 3:


Assess the security risks that your third-party vendors might create and learn how to put in place strong controls on their access to sensitive enterprise systems and data.

Third-Party
Risk Management:
Avoid The Dangers
Of Weak Controls

Enterprise IAM

Hackers have recently launched major attacks on enterprise systems by using weaknesses in third-party vendor security. This classroom on third-party IAM explores how enterprise InfoSec pros can manage vendors who have, by the nature of their work, access to enterprise systems.

TOP

Michael Cobb
Founder and managing director of Cobweb Applications

Michael Cobb, CISSP-ISSAP, is a renowned security author with more than 15 years of experience in the IT industry and another 16 years of experience in finance. He is the founder and managing director of Cobweb Applications Ltd., a consultancy that helps companies to secure their networks and websites, and also helps them achieve ISO 27001 certification. He co-authored the book IIS Security and has written numerous technical articles for leading IT publications.

TOP


Sponsor Resources

Hitachi Data Systems pursues Social Innovation with data-driven technology solutions that help you build a strong business and a healthier, safer, smarter society. To succeed in a world of disruptive change requires technological adaptation and smart decisions. We help you achieve both with a focus on data that offers real value – what we call the Internet of Things that matter. With software-defined infrastructure to improve IT agility and flexibility, we accelerate innovation, improve business outcomes, simplify the lives of mobile workers and administrators, and expedite business insight and competitive advantage. Transform to thrive with an agile data center, highly available content, and informed decision-making.

Learn More
  • Best Practices for Securing Privileged Access

  • Selecting a Privileged Identity Management Solution

  • Securing Embedded Passwords with Privileged Access Management

  • NCR Corporation Utilizes Security Suite to Manage Partner Access

  • Privileged Access Management Security Survey Results

  • Integrating Password Management with Enterprise Single Sign-On


TOP

Related Resources

TechTarget networking websites cover routing and switching, network security and management, application performance and delivery, VoIP, unified communications and collaboration, wireless LANs, Software Defined Networking, Wide Area Networks and mobility. SearchNetworking.com


Learn More
  • Read the full August edition of Information Security magazine





TOP

Follow Us

15.4k
6.6k
2.5k

Contact Us

  • info@TechTarget.com
  • 275 Grove Street
    Newton, MA 02466
  • @TechTarget
  • (888) 274-4111