Cybersmart 2022: Identity and Access Management - Home
Register    ➤

Watch On-Demand Now

Identity and access management are key parts of any sound cybersecurity program, especially as organizations begin to implement zero-trust strategies - before a system can trust a user, it must authenticate who they are and what they are allowed to access. But deploying identity and access tools and strategies can be very different for various levels of government. This webcast will look at how federal, state and local governments are using these technologies, including the best practices shared across sectors and where they differ.

On Demand: CyberSmart: Identity and Access Management

Identity and access management are key parts of any sound cybersecurity program, especially as organizations begin to implement zero-trust strategies - before a system can trust a user, it must authenticate who they are and what they are allowed to access. But deploying identity and access tools and strategies can be very different for various levels of government. This webcast will look at how federal, state and local governments are using these technologies, including the best practices shared across sectors and where they differ.

Speakers

Dr. Gregory Williams, Former Director of Security Risk and Compliance and Identity Access Management, State of Colorado

Sean Frazier, Chief Security Officer, Federal, Okta

Alisha Powell Gillis, Senior Editor, Route Fifty

George Jackson, Executive Producer, GovExec TV