David Glass Auditorium
Do you have a clear picture of your identity security posture? Who really has access to your applications and critical infrastructure? During this session we will lay the foundation of a practical identity structure while focusing on defining authentication and authorization. We will do this by ensuring best practices around least privilege is enforced, repeatable, and stable.