The CISO’s Guide to Planning for ABAC Success – with Guest Speakers from Security Architects Partners

A webinar with Axiomatics and Security Architects Partners

Axiomatics and Security Architects Partners present this session on the components for a successful transition from legacy access control models, such as Role-based Access Control, to one that enables dynamic authorization. Attribute Based Access Control, known as ABAC, is the new model for access control as identified by NIST and Gartner, to help organizations meet the needs of the evolving complexities of today’s business environments.

Many CISOs have identified use cases that require a policy-based approach to ensure regulatory compliance is met, that IP is protected and that the PII of customers is safeguarded. CISOs also identify a need to securely collaborate across their enterprise. In short, they are ready to begin an ABAC implementation and want to ensure its success.

This webinar will help you understand how to plan for success for a new access control model at your organization – who the players should be, the steps of the process, and what you can do to prepare for a seamless journey.

 

 

Other Resources

Webinars
The Convergence of Cloud, DevOps and Access Control
Security experts from industry-leading NTT DATA and Axiomatics are making a deep dive into migrating access control to the cloud. Follow the demonstration of how to set up a project for containerization using ALFA and Jenkins.
Webinars
ABAC as code – Applying Modern DevOps to Policy Authoring
A DevOps approach to externalized business policy engineering can ensure modern CI/CD processes help IT adoption of access control policy authoring.
Webinars
Taking an identity-centric approach to a modern security architecture
Federal agencies invest heavily in protecting data from external threat actors, but the insider threat problem requires a new approach to access control. While protecting data is paramount, that requirement must be balanced with the need to share certain information across a variety of use case scenarios within and across agencies/departments.