Women of influence: 30 top cybersecurity leaders 2021
SC Media UK's pick of the most influential women in cybersecurity through the pandemic.
By Kathryn Cave
“My grandmother,” wrote American author Amy Tan. “She's someone I never met, and I would've loved to have met her. She's been a huge influence on our entire family, not just me. She is a mystery.”
Influence is a strange and deceptive force. It can be tangible or intangible. Obvious or subtle. It can mean big, public things that touch the lives of everyone, or quieter, smaller things that have a lasting impact.
For most organisations, Active Directory (AD) is the key to identity and access management, which means it is vital that it stays operational and secure. Unfortunately, AD faces a surplus of risks every single day. Whether from ever-frequent cyber and ransomware attacks or critical misconfigurations, effective AD cybersecurity risk management can be a daunting endeavour.
Join us for this FREE live webinar on 14 June, where we'll discuss the threats and potential risks you face in your AD environment. See for yourself how to measure AD risk using a risk register (5x5) as well as learn ways you can mitigate those risks to ensure true cyber resilience.