c
April 5, 2023, 12:40 a.m. |

Cloud Security Alliance cloudsecurityalliance.org

Originally published by Axonius and MeriTalk. Written by Tom Kennedy. “You can’t secure what you can’t see” is a common refrain in cybersecurity circles. It’s echoed in multiple Federal IT mandates, including the zero trust strategy and the event logging memo from the Office of Management and Budget. Gaining comprehensive visibility across agency networks, devices, applications, and identities is no mean feat in today’s diverse and ever-changing IT environments. An accurate, complete, an...

agency applications asset asset inventory automated axonius budget cybersecurity devices environments event event logging federal federal it identities inventory kennedy logging management meritalk networks office office of management and budget strategy trust visibility zero trust zero trust strategy

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Salesforce Solution Consultant

@ BeyondTrust | Remote United States

Divisional Deputy City Solicitor, Public Safety Compliance Counsel - Compliance and Legislation Unit

@ City of Philadelphia | Philadelphia, PA, United States

Security Engineer, IT IAM, EIS

@ Micron Technology | Hyderabad - Skyview, India

Security Analyst

@ Northwestern Memorial Healthcare | Chicago, IL, United States

Werkstudent Cybersecurity (m/w/d)

@ Brose Group | Bamberg, DE, 96052