Cybersecurity | Cloud | DevelopmentSimplify identity and access management with SAP Cloud Identity Access Governance December 20, 2020 video accessAccess ControlAccess Governanceaccess riskCloud IAMfirefighterGRCIAMIdentity Managementprovisioningrole managementSAPsap firefighterSAP GRCsegregation of dutiessodSSO
Cybersecurity | Cloud | DevelopmentControlling EKS access with AWS IAM September 16, 2020 video Access ControlAWShasgeekSSH access
Cybersecurity | Cloud | DevelopmentThe Cyber Underground – The Current Threat Landscape in Academia July 30, 2020 video AcademiaAccess Controlcyber securitydirty networkDiversificationEconomyEnergyGlobalizationHawaiihostile networkitopen securitypopulartechThink Tech Hawaiiuniversity of hawaii
Cybersecurity | Cloud | DevelopmentConfiguration of 802.1X over Wi-Fi on Windows 2016 with NPS, ADDS, ADCS Roles February 19, 2020 video 2016802.1xAccess ControlActive DirectoryAuthenticationdomain controllerEAPLANMSCHAP V2networkNetwork Policy ServerNPSPEAPPolicyRadiusSecurityServerWindowsWPA2 Enterprise