CISO Workshop Module 3: Identity and Access Management

Because most modern attacks involve compromising user identities, learn how to build a new identity security perimeter to protect assets outside your corporate network.

Introduction: Identity and Access Management (2:32)

Part 2: Identity System Security (3:37)

Part 3: Account Security: Measuring Cost of Attack Password-less Authentication (13:11)

Part 4: Build an Identity Perimeter (13:57)

Part 5: Lowering Risk using business-to-business and business-to-customer (4:47)