The CISO’s Guide to Planning for ABAC Success – with Guest Speakers from Security Architects Partners

A webinar with Axiomatics and Security Architects Partners

Axiomatics and Security Architects Partners present this session on the components for a successful transition from legacy access control models, such as Role-based Access Control, to one that enables dynamic authorization. Attribute Based Access Control, known as ABAC, is the new model for access control as identified by NIST and Gartner, to help organizations meet the needs of the evolving complexities of today’s business environments.

Many CISOs have identified use cases that require a policy-based approach to ensure regulatory compliance is met, that IP is protected and that the PII of customers is safeguarded. CISOs also identify a need to securely collaborate across their enterprise. In short, they are ready to begin an ABAC implementation and want to ensure its success.

This webinar will help you understand how to plan for success for a new access control model at your organization – who the players should be, the steps of the process, and what you can do to prepare for a seamless journey.



Other Resources

Zero Trust Through Dynamic Authorization And Policy Driven Access
Join experts from KuppingerCole Analysts, Ericom and Axiomatics for an interactive discussion on the role of fine-grained access controls in adopting Zero Trust and how best to address that challenge to meet the needs of a hybrid workforce using cloud-based applications and adopting new ways of working, such as DevOps.
The Convergence of Cloud, DevOps and Access Control
Security experts from industry-leading NTT DATA and Axiomatics are making a deep dive into migrating access control to the cloud. Follow the demonstration of how to set up a project for containerization using ALFA and Jenkins.
ABAC as code – Applying Modern DevOps to Policy Authoring
A DevOps approach to externalized business policy engineering can ensure modern CI/CD processes help IT adoption of access control policy authoring.