CISO Perspectives (public) cover image

Identity Management: around the Hash Table.

CISO Perspectives (public)

00:00

Introduction

Security thought leaders talk about identity management in the real world. Rick Howard says many security programs are not tied to zero trust strategies. The only way to restrict access to your organization's material data islands is by having some sort of identity management programme. Visit scegit of defence dot com slash pro to learn more and join our mailing list.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app