Small Business Cybersecurity Part 2: Authentication
This webinar dives into identifying and authenticating system users, processes, and devices before allowing access to information systems along with how to control access to those systems. The portion on Identification and Authentication will detail how to determine if system users and processes acting on behalf of users are identified and how to identify and authenticate those users and processes. The practice on Access Control will discuss how to ensure anyone or anything attempting to access a system is identified and authorized, describe the types of transactions authorized users are permitted to execute, explain how to identify, verify and control connections to external systems, and how to control information posted or processed on publicly accessible information systems like social media accounts.
- Tim Taylor, SBDC Cybersecurity Training Coordinator, retired SBDC Research Supervisor and retired property crimes investigator will answer questions regarding Physical Protection and Media Protection.
- Rob Ruder, Adjunct MIS Professor, Gonzaga University and IT Consultant.