- Servicios de consultoría
Executive Order 14028: 3-Day Workshop
Design and plan out your optimal identity model to ensure you have a roadmap for enhanced security addressing the Executive Order 14028 requirements.
Why you should attend Given the complexity of identities, data, applications, and devices, it’s essential to learn how to ensure the right people are accessing the right information, securely. In this workshop, we’ll show you how identity is the fundamental pillar of an integrated security philosophy and end-to-end security strategy addressing the Executive Order 14028 requirements.
Highlights: Understand how Azure Active Directory addresses the Executive Order 14028 requirements. Gain insights into apps used in your environment – even ones unsanctioned by IT. Understand how to prevent identities from being compromised. Learn how to reduce costs and improve business agility and security with simplified app access.
What to expect The foundation of cybersecurity is to quickly and accurately identify authorized users and give them proper access to the information and tools they need to do their job. Our goal is to provide you with tools to protect your authorized users’ identities so you can authenticate credentials and manage file access while still giving users the freedom to collaborate with others.
We’ll work with you to: Mitigate your access risk by protecting, monitoring, and auditing access to critical assets through identity governance Outline strong authentication methods like native certificate-based authentication and phishing resistant multi-factor authentication Help you understand situations where your identity might be compromised with remediation steps Improve migration and governance to align with Executive Order 14028 guidance
Agenda The workshop is designed to help customers Understand how Azure Active Directory addresses the Executive Order 14028 requirements.
Outcome Design and plan out your optimal identity model to ensure you have a roadmap for enhanced security addressing the Executive Order 14028 requirements. Customer identity security posture rating, including how customers compare to their industry peers Visibility into all apps used in their environments and how to enhance access and security Clear understanding of situations where identity might be compromised and remediation steps Actionable recommendations and next steps for improved security and governance
Business Needs and Challenges Design a comprehensive strategy to mitigate your access risk by protecting, monitoring, and auditing access to critical assets through identity governance Outline strong authentication methods like native certificate-based authentication and phishing-resistant multi-factor authentication Need help understanding situations where your identity might be compromised with remediation steps as described by Executive Order 14028. Require guidance on how to improve migration and governance to align with Executive Order 14028 guidance.