Using the OWASP Top Ten to Upgrade Your Authorization Services

This is an exiting webinar on how the OWASP Top Ten can help you upgrade your authorization services. Our Americas President, and resident Attribute-based Access Control (ABAC) expert, Gerry Gebel will, together with well-known security expert Gunnar Peterson, be examining how you can use dynamic authorization to address some of the more common ways that companies’ are being breached today.

To do this Gerry and Gunnar will be using the OWASP Top Ten – the top ways attackers are breaching systems and stealing data – and explaining how and why ABAC comes into play.

If your company has been breached or you believe it’s in the danger zone, you won’t want to miss this video.



Other Resources

Zero Trust Through Dynamic Authorization And Policy Driven Access
Join experts from KuppingerCole Analysts, Ericom and Axiomatics for an interactive discussion on the role of fine-grained access controls in adopting Zero Trust and how best to address that challenge to meet the needs of a hybrid workforce using cloud-based applications and adopting new ways of working, such as DevOps.
The Convergence of Cloud, DevOps and Access Control
Security experts from industry-leading NTT DATA and Axiomatics are making a deep dive into migrating access control to the cloud. Follow the demonstration of how to set up a project for containerization using ALFA and Jenkins.
ABAC as code – Applying Modern DevOps to Policy Authoring
A DevOps approach to externalized business policy engineering can ensure modern CI/CD processes help IT adoption of access control policy authoring.