Basics of Access Control
Session 3: Basics of Access Control
Now that we’ve covered what assets you need to protect, let’s examine who is accessing them and how your utility manages that access. This session discusses identity and access management, including recommendations from the Scorecard and more mature practices from the Cybersecurity Capability Maturity Model.
Solving Cyber Risk
Connect With Us!
About The Hosts
Cyber risk is the peril of our generation, but organizations struggle to get actionable visibility to their risk. While technology can be part of the solution, it is not a silver bullet. Minimizing and managing cyber risk requires a comprehensive, continuous evaluation across processes, people, balance sheet controls, and technology.
Axio believes that everyone should have the means to solve their unique cyber risk challenges. We are a passionate team of cybersecurity, cyber risk, and business leaders who developed a unique and holistic methodology and software platform to deliver on that belief.
Our innovative and proprietary approach gives companies visibility to their cyber risk and cyber posture in a manner that enables the prioritization of investments to optimize the protection of their business, customers, and employees