A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


The Path to IAM Maturity - Jerod Brennan BSides Columbus Ohio 2019 (Hacking Illustrated Series InfoSec Tutorial Videos)

The Path to IAM Maturity
Jerod Brennan
BSides Columbus Ohio 2019

“Are we secure?” It’s the most dreaded question that information security and risk management professionals need to answer. Compliance is a useful starting point, but the number of “compliant” organizations who still suffered a data breach is proof positive that compliance simply isn’t enough. That’s where maturity models come into play. In this presentation, I’ll show you how to apply a capability maturity model (CMM) to your identity and access management (IAM) program, using that model to assess where you are today. I’ll also share tools and techniques you can use to accelerate improvements to your program.

By day, Jerod Brennen (@slandail) is a Security Solutions Architect with One Identity. By night, he's a husband, father, writer, filmmaker, martial artist, musician, and gamer. I think it's fair to say that he's earned every gray hair in his beard, having spent his career fulfilling infosec roles in consulting, higher education, retail, and public utilities. Jerod loves to share what he's learned over the years every chance he gets: at local and regional information security professional organizations, at larger information security conferences, and online via blogs and podcasts. He also teaches online information security courses for Pluralsight and LinkedIn Learning, as well as in-person courses, both domestically and internationally. At the end of the day, Jerod just wants to help folks get one step closer to doing what they want to do securely.

Back to BSides Columbus Ohio 2019 video list

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast