Register at: https://wsbdc.ecenterdirect.com/events/99271838
Register for part 3 (July 28th) here: https://wsbdc.ecenterdirect.com/events/99271839
This webinar dives into identifying and authenticating system users, processes, and devices before allowing access to information systems along with how to control access to those systems. The portion on Identification and Authentication will detail how to determine if system users and processes acting on behalf of users are identified and how to identify and authenticate those users and processes. The practice on Access Control will discuss how to ensure anyone or anything attempting to access a system is identified and authorized, describe the types of transactions authorized users are permitted to execute, explain how to identify, verify and control connections to external systems, and how to control information posted or processed on publicly accessible information systems like social media accounts.
A Zoom link for the webinar will be sent prior to the event to those who register.
Our Zoom security protocols require each participant have a Zoom account and be signed into their account from their computer or mobile device. https://zoom.us/