Small Business Cybersecurity Part 2: Authentication
Register here: https://wsbdc.ecenterdirect.com/events/99271835 This webinar dives into identifying and authenticating system users, processes, and devices before allowing access to information systems along with how to control access to those systems. The portion on Identification and Authentication will detail how to determine if system users and processes acting on behalf of users are identified and how to identify and authenticate those users and processes. The practice on Access Control will discuss how to ensure anyone or anything attempting to access a system is identified and authorized, describe the types of transactions authorized users are permitted to execute, explain how to identify, verify...