Identity & Access Management
Layers of security are rendered useless if you inadvertantly give permission for the threat actor to access your data. Controlling who has access to the right data at the right time seems simple, but is offset by making sure it is safe from outside (and inside) interests. Join experts in the field to learn how to walk the line between convenience, accessibility and security.
Inspector General of Police-Training, Govt. of MaharashtraRead Bio