Tales from the Field – Authz Compliance Webinar

December 1, 2014 Kevin O'Brien


It’s hard to believe, but we’re at the end of 2014 — and what a doozy of a year. Between the recent Sony breach to the continued struggles for compliance at the VA, from Code Spaces to Active Directory, a consistent theme of the year past has been the struggle to understand security not only in terms of the perimeter, but also as a function of authentication, authorization, and audit.


In the third and final in our series of authorization-focused webinars for 2014, we’re very excited to be joined by special guest panelist Dan Kamalic. Dan is a cloud architect with GNS Healthcare, where he helped identify and implement Conjur to address a range of authz and compliance-related needs. We’ll be hosting a live discussion with Dan and the Conjur team on December 16 at 1pm EDT, talking about both the broader changes that are driving the need for better authorization security and authz compliance, as well as the specifics of using Conjur at GNS Healthcare.

We’re really excited to have Dan joining us, and hope you will, too. You can register for the session by clicking the “Register Now” button below:

We’ll be setting aside lots of time to take questions from the audience, as well; this is a great chance to ask a real presenter what their experiences were when implementing Conjur, what the alternatives they considered were, and what authorization-related advice and insight they’d offer to anyone just getting started with a major cloud initiative.

And, of course, if you’d like to follow along with your own free trial of Conjur, you can sign up any time. It’s simple and fast – just click here!


Previous Article
The Privileged Aspect of the Recent Kerberos Vulnerability
The Privileged Aspect of the Recent Kerberos Vulnerability

By John Worrall A rare, out-of-band patch from Microsoft a couple of weeks ago once again reminds us all th...

Next Article
Cyber Threat Investigators Identify “Signature” of Most Dangerous Cyber Attacks
Cyber Threat Investigators Identify “Signature” of Most Dangerous Cyber Attacks

By John Worrall Organizations are under constant threat of attack, yet few truly understand how they’re bei...

Check out our upcoming webinars!

See Webinars