IT Courses at GCA TRAINING_____________



Key Takeaways:
Colonial Pipeline Attack

No one would have guessed that a typical ransomware attack would create a domino effect that ended in half of the United States going without gas. The Colonial Pipeline Attack was the wake-up call a lot of IT leaders nee...

Smart Female IT Programer Working on Desktop Computer in Data Center System Control Room. Team of Young Professionals Doing Code Programming

ForgeRock OpenAM Vulnerability: What You Need to Know

On Monday, July 12, 2021, the Cybersecurity and Infrastructure Security Agency (CISA) gave notice of a vulnerability with ForgeRock’s OpenAM. This popular Access Management platform is used as a front end for web applica...

Featured Image

Gartner Identity & Access Management Summit 2019 Takeaways

For the second year in a row, GCA attended Gartner’s Identity & Access Management Summit 2019 in Las Vegas, Nevada. We spent three days learning about new IAM strategies, sharing insights and meeting with leaders in ...

superhero businessman looking at city skyline at sunset. the concept of success, leadership and victory in business.

How to Adapt As A Leader Based On Who You Are Leading

Leadership vs. Management One of the biggest misconceptions that people in positions of power seem to believe is that by landing themselves a leadership position, they inherently have the necessary skillset to sufficient...

Zero Trust

Relationships Built On Zero Trust

Zero Trust vs. Too Much Trust In a Zero Trust Relationship, it’s not you, it’s me. Or more accurately – it’s not you, it’s the business necessity of keeping information and identities protected within an organizati...

IT Terminology

IT Terminology For The Busy Professional

Emerging Technologies Are Hard To Keep Up With By now, many of you have likely stumbled across the viral social media video of a child in a convenience store articulating the meaning of blockchain in simplistic terms to ...


Do You Have Shadows Lurking In Your IT?

What is Shadow IT? When you think of a shadow, what are some of the first things that come to mind: maybe a scene from a scary movie you watched against your better judgement, or perhaps an ominous late night venture thr...


The Circus Act of Balancing Business Optimization & Security Risk Mitigation

Juggling security risk mitigation and optimization  As an information technology leader, your job is equal parts of security risk mitigation and circus juggler. Not only is it your job to mitigate the ever-present threat...


Data Access Governance: Before and After

Implementing A Proper Data Access Governance Solution It’s amazing what a properly deployed Data Access Governance solution can do for an organization. When I walked into our client’s office on a hot Texas morning, I kne...


Automating Identity Management Processes: Don’t Go it Alone

Identity Management Automation: Vendor Vs. In-House Solution Has someone from your organization approached you about automating manual identity management processes?  Let’s face it, there are many mundane tasks present i...

Call Now ButtonTalk To Our CTO Now