ºÝºÝߣshows by User: JeanFranoisLOMBARDO / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: JeanFranoisLOMBARDO / Wed, 15 May 2024 13:22:45 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: JeanFranoisLOMBARDO 2023 Identiverse - Enforcing consent conformance in your authorization logic with a fine-grained permissions model -final - 20230531.pdf /slideshow/2023-identiverse-enforcing-consent-conformance-in-your-authorization-logic-with-a-fine-grained-permissions-model-final-20230531-pdf/268497925 2023identiverse-enforcingconsentconformanceinyourauthorizationlogicwithafine-grainedpermissionsmodel-240515132245-a00d8d23
This presentation done at Identiverse 2023 presents how to enforce consent acquired from data subject as access control polices that can be used for fine grained authorization strategy]]>

This presentation done at Identiverse 2023 presents how to enforce consent acquired from data subject as access control polices that can be used for fine grained authorization strategy]]>
Wed, 15 May 2024 13:22:45 GMT /slideshow/2023-identiverse-enforcing-consent-conformance-in-your-authorization-logic-with-a-fine-grained-permissions-model-final-20230531-pdf/268497925 JeanFranoisLOMBARDO@slideshare.net(JeanFranoisLOMBARDO) 2023 Identiverse - Enforcing consent conformance in your authorization logic with a fine-grained permissions model -final - 20230531.pdf JeanFranoisLOMBARDO This presentation done at Identiverse 2023 presents how to enforce consent acquired from data subject as access control polices that can be used for fine grained authorization strategy <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2023identiverse-enforcingconsentconformanceinyourauthorizationlogicwithafine-grainedpermissionsmodel-240515132245-a00d8d23-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation done at Identiverse 2023 presents how to enforce consent acquired from data subject as access control polices that can be used for fine grained authorization strategy
2023 Identiverse - Enforcing consent conformance in your authorization logic with a fine-grained permissions model -final - 20230531.pdf from Jean-Franå·½ois LOMBARDO
]]>
6 0 https://cdn.slidesharecdn.com/ss_thumbnails/2023identiverse-enforcingconsentconformanceinyourauthorizationlogicwithafine-grainedpermissionsmodel-240515132245-a00d8d23-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
AWS Canada Security Week 2024 - Définir et mettre en oeuvre votre stratégie de cybersécurité sur AWS - speaker notes.pptx https://fr.slideshare.net/slideshow/aws-canada-security-week-2024-definir-et-mettre-en-oeuvre-votre-strategie-de-cybersecurite-sur-aws-speaker-notes-pptx/268497471 awscanadasecurityweek2024-dfiniretmettreenoeuvrevotrestratgiedecyberscuritsuraws-speakernotes-240515131753-814bf0cb
Présentation pour la Semaine de la Sécurité AWS Canada 2024sur la Gouvernance de Sécurité dans l'infonuagique, comment démarrer, améliorer, et contrôler son implémentation]]>

Présentation pour la Semaine de la Sécurité AWS Canada 2024sur la Gouvernance de Sécurité dans l'infonuagique, comment démarrer, améliorer, et contrôler son implémentation]]>
Wed, 15 May 2024 13:17:52 GMT https://fr.slideshare.net/slideshow/aws-canada-security-week-2024-definir-et-mettre-en-oeuvre-votre-strategie-de-cybersecurite-sur-aws-speaker-notes-pptx/268497471 JeanFranoisLOMBARDO@slideshare.net(JeanFranoisLOMBARDO) AWS Canada Security Week 2024 - Définir et mettre en oeuvre votre stratégie de cybersécurité sur AWS - speaker notes.pptx JeanFranoisLOMBARDO Présentation pour la Semaine de la Sécurité AWS Canada 2024sur la Gouvernance de Sécurité dans l'infonuagique, comment démarrer, améliorer, et contrôler son implémentation <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/awscanadasecurityweek2024-dfiniretmettreenoeuvrevotrestratgiedecyberscuritsuraws-speakernotes-240515131753-814bf0cb-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Présentation pour la Semaine de la Sécurité AWS Canada 2024sur la Gouvernance de Sécurité dans l&#39;infonuagique, comment démarrer, améliorer, et contrôler son implémentation
from Jean-Franå·½ois LOMBARDO
]]>
28 0 https://cdn.slidesharecdn.com/ss_thumbnails/awscanadasecurityweek2024-dfiniretmettreenoeuvrevotrestratgiedecyberscuritsuraws-speakernotes-240515131753-814bf0cb-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
SEC301 - New AWS security services for container threat detection - final.pdf /slideshow/sec301-new-aws-security-services-for-container-threat-detection-finalpdf/252391953 sec301-newawssecurityservicesforcontainerthreatdetection-final-220801201959-0087c749
Presentation of Amazon GuardDuty and Inspector for EKS for extended threat detection and remediation]]>

Presentation of Amazon GuardDuty and Inspector for EKS for extended threat detection and remediation]]>
Mon, 01 Aug 2022 20:19:59 GMT /slideshow/sec301-new-aws-security-services-for-container-threat-detection-finalpdf/252391953 JeanFranoisLOMBARDO@slideshare.net(JeanFranoisLOMBARDO) SEC301 - New AWS security services for container threat detection - final.pdf JeanFranoisLOMBARDO Presentation of Amazon GuardDuty and Inspector for EKS for extended threat detection and remediation <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sec301-newawssecurityservicesforcontainerthreatdetection-final-220801201959-0087c749-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation of Amazon GuardDuty and Inspector for EKS for extended threat detection and remediation
SEC301 - New AWS security services for container threat detection - final.pdf from Jean-Franå·½ois LOMBARDO
]]>
128 0 https://cdn.slidesharecdn.com/ss_thumbnails/sec301-newawssecurityservicesforcontainerthreatdetection-final-220801201959-0087c749-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdf /slideshow/jeff-lombardo-enforcing-access-control-in-depth-with-aws-v12pdf/251563430 jefflombardo-enforcingaccesscontrolindepthwithaws-v1-220411145128
Infrastructure Security services are seen as the traditional mechanisms for enforcing protection of data. But now Identity and Access Management has to be considered too to prevent illegitimate access to information, unauthorized usage of services, and tampering of data. This is why, at AWS, Identity and Access Management oriented services is global service in our portfolio. Implementing a least privileged model for your workload requires that you consider what each component must have as permissions. For example: is it better to assign an IAM role to your Compute instance or to impersonate the initial requestor with their roles and permissions? Are the attributes of the requestor important for your access control logic? Can the context of the request influence how the resource should be disclosed? Answering those questions will allow you to design and implement access control thanks to a composition of multiple mechanisms. Through this session, we will describe how a very simple web store application will benefit from implementing: identity federation, attribute-based access control, and security token exchange through the usage of the appropriate AWS services. ]]>

Infrastructure Security services are seen as the traditional mechanisms for enforcing protection of data. But now Identity and Access Management has to be considered too to prevent illegitimate access to information, unauthorized usage of services, and tampering of data. This is why, at AWS, Identity and Access Management oriented services is global service in our portfolio. Implementing a least privileged model for your workload requires that you consider what each component must have as permissions. For example: is it better to assign an IAM role to your Compute instance or to impersonate the initial requestor with their roles and permissions? Are the attributes of the requestor important for your access control logic? Can the context of the request influence how the resource should be disclosed? Answering those questions will allow you to design and implement access control thanks to a composition of multiple mechanisms. Through this session, we will describe how a very simple web store application will benefit from implementing: identity federation, attribute-based access control, and security token exchange through the usage of the appropriate AWS services. ]]>
Mon, 11 Apr 2022 14:51:28 GMT /slideshow/jeff-lombardo-enforcing-access-control-in-depth-with-aws-v12pdf/251563430 JeanFranoisLOMBARDO@slideshare.net(JeanFranoisLOMBARDO) Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdf JeanFranoisLOMBARDO Infrastructure Security services are seen as the traditional mechanisms for enforcing protection of data. But now Identity and Access Management has to be considered too to prevent illegitimate access to information, unauthorized usage of services, and tampering of data. This is why, at AWS, Identity and Access Management oriented services is global service in our portfolio. Implementing a least privileged model for your workload requires that you consider what each component must have as permissions. For example: is it better to assign an IAM role to your Compute instance or to impersonate the initial requestor with their roles and permissions? Are the attributes of the requestor important for your access control logic? Can the context of the request influence how the resource should be disclosed? Answering those questions will allow you to design and implement access control thanks to a composition of multiple mechanisms. Through this session, we will describe how a very simple web store application will benefit from implementing: identity federation, attribute-based access control, and security token exchange through the usage of the appropriate AWS services. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/jefflombardo-enforcingaccesscontrolindepthwithaws-v1-220411145128-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Infrastructure Security services are seen as the traditional mechanisms for enforcing protection of data. But now Identity and Access Management has to be considered too to prevent illegitimate access to information, unauthorized usage of services, and tampering of data. This is why, at AWS, Identity and Access Management oriented services is global service in our portfolio. Implementing a least privileged model for your workload requires that you consider what each component must have as permissions. For example: is it better to assign an IAM role to your Compute instance or to impersonate the initial requestor with their roles and permissions? Are the attributes of the requestor important for your access control logic? Can the context of the request influence how the resource should be disclosed? Answering those questions will allow you to design and implement access control thanks to a composition of multiple mechanisms. Through this session, we will describe how a very simple web store application will benefit from implementing: identity federation, attribute-based access control, and security token exchange through the usage of the appropriate AWS services.
Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdf from Jean-Franå·½ois LOMBARDO
]]>
123 0 https://cdn.slidesharecdn.com/ss_thumbnails/jefflombardo-enforcingaccesscontrolindepthwithaws-v1-220411145128-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Amazon EKS - security best practices - 2022 /slideshow/amazon-eks-security-best-practices-2022/251178626 eks-securitybestpractices-2022-220215143544
Community Builder session on Amazon EKS and how to enforce Security controls on top of it. This deep dive on the core difference with EC2 security model as long as the native integration with other AWS Security Services]]>

Community Builder session on Amazon EKS and how to enforce Security controls on top of it. This deep dive on the core difference with EC2 security model as long as the native integration with other AWS Security Services]]>
Tue, 15 Feb 2022 14:35:44 GMT /slideshow/amazon-eks-security-best-practices-2022/251178626 JeanFranoisLOMBARDO@slideshare.net(JeanFranoisLOMBARDO) Amazon EKS - security best practices - 2022 JeanFranoisLOMBARDO Community Builder session on Amazon EKS and how to enforce Security controls on top of it. This deep dive on the core difference with EC2 security model as long as the native integration with other AWS Security Services <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/eks-securitybestpractices-2022-220215143544-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Community Builder session on Amazon EKS and how to enforce Security controls on top of it. This deep dive on the core difference with EC2 security model as long as the native integration with other AWS Security Services
Amazon EKS - security best practices - 2022 from Jean-Franå·½ois LOMBARDO
]]>
451 0 https://cdn.slidesharecdn.com/ss_thumbnails/eks-securitybestpractices-2022-220215143544-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Yul identity in depth identity enforcement with jwap - 20200609 /slideshow/yul-identity-in-depth-identity-enforcement-with-jwap-20200609/235845766 yulidentity-indepthidentityenforcementwithjwap-20200609-200618121403
How to propagate Identity context to legacy building blocks such as Databases? Is there a way to reuse the JWT acquired at Front-End to enable Dynamic Authorization at micro-services and Back-Ends? Discover the JWAP mechanism]]>

How to propagate Identity context to legacy building blocks such as Databases? Is there a way to reuse the JWT acquired at Front-End to enable Dynamic Authorization at micro-services and Back-Ends? Discover the JWAP mechanism]]>
Thu, 18 Jun 2020 12:14:03 GMT /slideshow/yul-identity-in-depth-identity-enforcement-with-jwap-20200609/235845766 JeanFranoisLOMBARDO@slideshare.net(JeanFranoisLOMBARDO) Yul identity in depth identity enforcement with jwap - 20200609 JeanFranoisLOMBARDO How to propagate Identity context to legacy building blocks such as Databases? Is there a way to reuse the JWT acquired at Front-End to enable Dynamic Authorization at micro-services and Back-Ends? Discover the JWAP mechanism <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/yulidentity-indepthidentityenforcementwithjwap-20200609-200618121403-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How to propagate Identity context to legacy building blocks such as Databases? Is there a way to reuse the JWT acquired at Front-End to enable Dynamic Authorization at micro-services and Back-Ends? Discover the JWAP mechanism
Yul identity in depth identity enforcement with jwap - 20200609 from Jean-Franå·½ois LOMBARDO
]]>
188 0 https://cdn.slidesharecdn.com/ss_thumbnails/yulidentity-indepthidentityenforcementwithjwap-20200609-200618121403-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Eic munich-2019-ripple effect of gdpr in na- cx pa-rev20190430 /slideshow/eic-munich2019ripple-effect-of-gdpr-in-na-cx-parev20190430/217497745 eic-munich-2019-rippleeffectofgdprinna-cxpa-rev20190430-200109021135
What is coming after GDPR in the US? a take on CCPA and CDPA and how it scores/hits vs GDPR]]>

What is coming after GDPR in the US? a take on CCPA and CDPA and how it scores/hits vs GDPR]]>
Thu, 09 Jan 2020 02:11:35 GMT /slideshow/eic-munich2019ripple-effect-of-gdpr-in-na-cx-parev20190430/217497745 JeanFranoisLOMBARDO@slideshare.net(JeanFranoisLOMBARDO) Eic munich-2019-ripple effect of gdpr in na- cx pa-rev20190430 JeanFranoisLOMBARDO What is coming after GDPR in the US? a take on CCPA and CDPA and how it scores/hits vs GDPR <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/eic-munich-2019-rippleeffectofgdprinna-cxpa-rev20190430-200109021135-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> What is coming after GDPR in the US? a take on CCPA and CDPA and how it scores/hits vs GDPR
Eic munich-2019-ripple effect of gdpr in na- cx pa-rev20190430 from Jean-Franå·½ois LOMBARDO
]]>
467 0 https://cdn.slidesharecdn.com/ss_thumbnails/eic-munich-2019-rippleeffectofgdprinna-cxpa-rev20190430-200109021135-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Identiverse 2019-navigating nist sp-800-63-3 -x a-ls cheat sheets-rev20190624 /JeanFranoisLOMBARDO/identiverse-2019navigating-nist-sp800633-x-als-cheat-sheetsrev20190624 identiverse-2019-navigatingnistsp-800-63-3-xalscheatsheets-rev20190624-200109014450
Identiverse 2019 talk on NIST SP 800-63-3A]]>

Identiverse 2019 talk on NIST SP 800-63-3A]]>
Thu, 09 Jan 2020 01:44:50 GMT /JeanFranoisLOMBARDO/identiverse-2019navigating-nist-sp800633-x-als-cheat-sheetsrev20190624 JeanFranoisLOMBARDO@slideshare.net(JeanFranoisLOMBARDO) Identiverse 2019-navigating nist sp-800-63-3 -x a-ls cheat sheets-rev20190624 JeanFranoisLOMBARDO Identiverse 2019 talk on NIST SP 800-63-3A <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/identiverse-2019-navigatingnistsp-800-63-3-xalscheatsheets-rev20190624-200109014450-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Identiverse 2019 talk on NIST SP 800-63-3A
Identiverse 2019-navigating nist sp-800-63-3 -x a-ls cheat sheets-rev20190624 from Jean-Franå·½ois LOMBARDO
]]>
388 3 https://cdn.slidesharecdn.com/ss_thumbnails/identiverse-2019-navigatingnistsp-800-63-3-xalscheatsheets-rev20190624-200109014450-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
IdentityNorth Montreal - Furture Proof your Digital Identity strategy /JeanFranoisLOMBARDO/identitynorth-montreal-furture-proof-your-digital-identity-strategy identitynorth-mtl-2018-future-proof-customer-identity-strategy-rev20180413d-180503153112
Planning for future is hard but is also the best way to keep your technological debt under control. Same apply for the Digital Identity strategy. Learn from the future and act now.]]>

Planning for future is hard but is also the best way to keep your technological debt under control. Same apply for the Digital Identity strategy. Learn from the future and act now.]]>
Thu, 03 May 2018 15:31:12 GMT /JeanFranoisLOMBARDO/identitynorth-montreal-furture-proof-your-digital-identity-strategy JeanFranoisLOMBARDO@slideshare.net(JeanFranoisLOMBARDO) IdentityNorth Montreal - Furture Proof your Digital Identity strategy JeanFranoisLOMBARDO Planning for future is hard but is also the best way to keep your technological debt under control. Same apply for the Digital Identity strategy. Learn from the future and act now. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/identitynorth-mtl-2018-future-proof-customer-identity-strategy-rev20180413d-180503153112-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Planning for future is hard but is also the best way to keep your technological debt under control. Same apply for the Digital Identity strategy. Learn from the future and act now.
IdentityNorth Montreal - Furture Proof your Digital Identity strategy from Jean-Franå·½ois LOMBARDO
]]>
355 4 https://cdn.slidesharecdn.com/ss_thumbnails/identitynorth-mtl-2018-future-proof-customer-identity-strategy-rev20180413d-180503153112-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
CPA - Introduction to Digital Identity - rev20171102 /slideshow/cpa-introduction-to-digital-identity-rev20171102/92834573 cpa-coursgouvernance-rev20171102-180404020255
Realized for the CPA, a small introduction to Digital Identity. This presentation was to set every attendee on the same level of knowledge.]]>

Realized for the CPA, a small introduction to Digital Identity. This presentation was to set every attendee on the same level of knowledge.]]>
Wed, 04 Apr 2018 02:02:55 GMT /slideshow/cpa-introduction-to-digital-identity-rev20171102/92834573 JeanFranoisLOMBARDO@slideshare.net(JeanFranoisLOMBARDO) CPA - Introduction to Digital Identity - rev20171102 JeanFranoisLOMBARDO Realized for the CPA, a small introduction to Digital Identity. This presentation was to set every attendee on the same level of knowledge. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cpa-coursgouvernance-rev20171102-180404020255-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Realized for the CPA, a small introduction to Digital Identity. This presentation was to set every attendee on the same level of knowledge.
CPA - Introduction to Digital Identity - rev20171102 from Jean-Franå·½ois LOMBARDO
]]>
115 4 https://cdn.slidesharecdn.com/ss_thumbnails/cpa-coursgouvernance-rev20171102-180404020255-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC strategies /slideshow/kuppingercole-ciwusa17-chaining-identity-blocks-to-boost-your-ux-and-kyc-strategies/79751388 kc-ciam-seattle-2017-chainingidentityblocks-rev20170901l-170914034508
Presentation to Kuppinger Cole event at Seattle (September 2017) on CIAM strategy through chaining of identity blocks]]>

Presentation to Kuppinger Cole event at Seattle (September 2017) on CIAM strategy through chaining of identity blocks]]>
Thu, 14 Sep 2017 03:45:08 GMT /slideshow/kuppingercole-ciwusa17-chaining-identity-blocks-to-boost-your-ux-and-kyc-strategies/79751388 JeanFranoisLOMBARDO@slideshare.net(JeanFranoisLOMBARDO) KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC strategies JeanFranoisLOMBARDO Presentation to Kuppinger Cole event at Seattle (September 2017) on CIAM strategy through chaining of identity blocks <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/kc-ciam-seattle-2017-chainingidentityblocks-rev20170901l-170914034508-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation to Kuppinger Cole event at Seattle (September 2017) on CIAM strategy through chaining of identity blocks
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC strategies from Jean-Franå·½ois LOMBARDO
]]>
488 5 https://cdn.slidesharecdn.com/ss_thumbnails/kc-ciam-seattle-2017-chainingidentityblocks-rev20170901l-170914034508-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en rev 20170512 /slideshow/session-2017-casb-the-swiss-army-knife-that-wants-to-be-a-magic-wand-en-rev-20170512/77468833 session2017-casblecouteausuissequiseveutunebaguettemagique-enrev20170512-170703160307
CASB is still neboulous and mysterious but it is just the extension of the IDaaS strategy. Here is why]]>

CASB is still neboulous and mysterious but it is just the extension of the IDaaS strategy. Here is why]]>
Mon, 03 Jul 2017 16:03:07 GMT /slideshow/session-2017-casb-the-swiss-army-knife-that-wants-to-be-a-magic-wand-en-rev-20170512/77468833 JeanFranoisLOMBARDO@slideshare.net(JeanFranoisLOMBARDO) Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en rev 20170512 JeanFranoisLOMBARDO CASB is still neboulous and mysterious but it is just the extension of the IDaaS strategy. Here is why <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/session2017-casblecouteausuissequiseveutunebaguettemagique-enrev20170512-170703160307-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> CASB is still neboulous and mysterious but it is just the extension of the IDaaS strategy. Here is why
Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en rev 20170512 from Jean-Franå·½ois LOMBARDO
]]>
269 4 https://cdn.slidesharecdn.com/ss_thumbnails/session2017-casblecouteausuissequiseveutunebaguettemagique-enrev20170512-170703160307-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Synposium gia quebec setting the new course for digital identity- en rev 20170227 /slideshow/synposium-gia-quebec-setting-the-new-course-for-digital-identity-en-rev-20170227/77315831 synposiumgiaquebec-settingthenewcoursefordigitalidentity-enrev20170227-170627215255
Digitial ID and IAM are evolving fast, here are some elements to keep the track and to help the shaping of Digital ID roadmap]]>

Digitial ID and IAM are evolving fast, here are some elements to keep the track and to help the shaping of Digital ID roadmap]]>
Tue, 27 Jun 2017 21:52:55 GMT /slideshow/synposium-gia-quebec-setting-the-new-course-for-digital-identity-en-rev-20170227/77315831 JeanFranoisLOMBARDO@slideshare.net(JeanFranoisLOMBARDO) Synposium gia quebec setting the new course for digital identity- en rev 20170227 JeanFranoisLOMBARDO Digitial ID and IAM are evolving fast, here are some elements to keep the track and to help the shaping of Digital ID roadmap <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/synposiumgiaquebec-settingthenewcoursefordigitalidentity-enrev20170227-170627215255-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Digitial ID and IAM are evolving fast, here are some elements to keep the track and to help the shaping of Digital ID roadmap
Synposium gia quebec setting the new course for digital identity- en rev 20170227 from Jean-Franå·½ois LOMBARDO
]]>
113 3 https://cdn.slidesharecdn.com/ss_thumbnails/synposiumgiaquebec-settingthenewcoursefordigitalidentity-enrev20170227-170627215255-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-JeanFranoisLOMBARDO-48x48.jpg?cb=1715779004 Versatile, with a strong technical background, acting as a SME with a personal commitment to share his knowledge, to teach to others and to learn from the bests. Capable of delivering from pre - sales to operationalization https://cdn.slidesharecdn.com/ss_thumbnails/2023identiverse-enforcingconsentconformanceinyourauthorizationlogicwithafine-grainedpermissionsmodel-240515132245-a00d8d23-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/2023-identiverse-enforcing-consent-conformance-in-your-authorization-logic-with-a-fine-grained-permissions-model-final-20230531-pdf/268497925 2023 Identiverse - Enf... https://cdn.slidesharecdn.com/ss_thumbnails/awscanadasecurityweek2024-dfiniretmettreenoeuvrevotrestratgiedecyberscuritsuraws-speakernotes-240515131753-814bf0cb-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/aws-canada-security-week-2024-definir-et-mettre-en-oeuvre-votre-strategie-de-cybersecurite-sur-aws-speaker-notes-pptx/268497471 AWS Canada Security We... https://cdn.slidesharecdn.com/ss_thumbnails/sec301-newawssecurityservicesforcontainerthreatdetection-final-220801201959-0087c749-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/sec301-new-aws-security-services-for-container-threat-detection-finalpdf/252391953 SEC301 - New AWS secur...