
Identity Management: around the Hash Table.
CISO Perspectives (public)
00:00
Introduction
Security thought leaders talk about identity management in the real world. Rick Howard says many security programs are not tied to zero trust strategies. The only way to restrict access to your organization's material data islands is by having some sort of identity management programme. Visit scegit of defence dot com slash pro to learn more and join our mailing list.
Transcript
Play full episode