This webinar is the second in a three-part series.
Register for part 3 (June 7th) here: https://wsbdc.ecenterdirect.com/events/99271836
This webinar dives into identifying and authenticating system users, processes, and devices before allowing access to information systems along with how to control access to those systems. The portion on Identification and Authentication will detail how to determine if system users and processes acting on behalf of users are identified and how to identify and authenticate those users and processes. The practice on Access Control will discuss how to ensure anyone or anything attempting to access a system is identified and authorized, describe the types of transactions authorized users are permitted to execute, explain how to identify, verify and control connections to external systems, and how to control information posted or processed on publicly accessible information systems like social media accounts.