Many organizations continue to face access management challenges as they expand their compute footprint to the cloud and work through acquisitions, outsourcing, and digital transformation initiatives. Over the past several years, data breach research studies have highlighted vendor remote access as one the most common—and damaging—cyberattack vectors. Still, businesses lack a coherent model for protecting expanding use cases for third-party access, so these remote access weak links continue to be exploited.

Watch this on-demand webinar with Dan Blum, cybersecurity author and expert, who explores:

Dan Blum

Cybersecurity Strategist and Author

Dan Blum is an internationally recognized strategist in cybersecurity and risk management. He was a Golden Quill Award winning VP and Distinguished Analyst at Gartner, Inc., has served as the security leader for several startups and consulting companies, and has advised 100s of large corporations, universities and government organizations. He consults with clients on identity management, PAM, risk management, and other topics. He's made his new book Rational Cybersecurity for Business: The Security Leaders' Guide to Business Alignment freely available for Open Access via Apress, or on Amazon.