Using the OWASP Top Ten to Upgrade Your Authorization Services

This is an exiting webinar on how the OWASP Top Ten can help you upgrade your authorization services. Our Americas President, and resident Attribute-based Access Control (ABAC) expert, Gerry Gebel will, together with well-known security expert Gunnar Peterson, be examining how you can use dynamic authorization to address some of the more common ways that companies’ are being breached today.

To do this Gerry and Gunnar will be using the OWASP Top Ten – the top ways attackers are breaching systems and stealing data – and explaining how and why ABAC comes into play.

If your company has been breached or you believe it’s in the danger zone, you won’t want to miss this video.



Other Resources

The Convergence of Cloud, DevOps and Access Control
Security experts from industry-leading NTT DATA and Axiomatics are making a deep dive into migrating access control to the cloud. Follow the demonstration of how to set up a project for containerization using ALFA and Jenkins.
ABAC as code – Applying Modern DevOps to Policy Authoring
A DevOps approach to externalized business policy engineering can ensure modern CI/CD processes help IT adoption of access control policy authoring.
Taking an identity-centric approach to a modern security architecture
Federal agencies invest heavily in protecting data from external threat actors, but the insider threat problem requires a new approach to access control. While protecting data is paramount, that requirement must be balanced with the need to share certain information across a variety of use case scenarios within and across agencies/departments.