IT Courses at GCA TRAINING_____________

Archive for author: debanks

Zero Trust

Relationships Built On Zero Trust

Zero Trust vs. Too Much Trust In a Zero Trust Relationship, it’s not you, it’s me. Or more accurately – it’s not you, it’s the business necessity of keeping information and identities protected within an organizati...

IT Terminology

IT Terminology For The Busy Professional

Emerging Technologies Are Hard To Keep Up With By now, many of you have likely stumbled across the viral social media video of a child in a convenience store articulating the meaning of blockchain in simplistic terms to ...

AdobeStock_81343637

Do You Have Shadows Lurking In Your IT?

What is Shadow IT? When you think of a shadow, what are some of the first things that come to mind: maybe a scene from a scary movie you watched against your better judgement, or perhaps an ominous late night venture thr...

Chess is like leadership

How to Adapt As A Leader Based On Who You Are Leading

Leadership vs. Management One of the biggest misconceptions that people in positions of power seem to believe is that by landing themselves a leadership position, they inherently have the necessary skillset to sufficient...

security-risk-mitigation

The Circus Act of Balancing Business Optimization & Security Risk Mitigation

Juggling security risk mitigation and optimization  As an information technology leader, your job is equal parts of security risk mitigation and circus juggler. Not only is it your job to mitigate the ever-present threat...

Implementation-Services-Header

Data Access Governance: Before and After

Implementing A Proper Data Access Governance Solution It’s amazing what a properly deployed Data Access Governance solution can do for an organization. When I walked into our client’s office on a hot Texas morning, I kne...

Automating-Identity-Management-Processes-Dont-Go-it-Alone

Automating Identity Management Processes: Don’t Go it Alone

Identity Management Automation: Vendor Vs. In-House Solution Has someone from your organization approached you about automating manual identity management processes?  Let’s face it, there are many mundane tasks present i...

4-Keys-to-a-Successful-Identity-Management-Implementation

4 Keys to a Successful Identity Management Implementation

  Implementing A Successful Identity Management Strategy Are you looking to implement a solution for Identity Governance Administration (IGA), Identity and Access Management (IAM), or just plain old Identity Managem...

4-Key-Steps-to-Prepare-for-an-Identity-and-Access-Management-IAM-Rollout

4 Key Steps to Prepare for an Identity and Access Management (IAM) Rollout

Executing The Right Identity and Access Management (IAM) Rollout Strategy Active Directory used to be the standard for leveraging application identity storage. When the Internet began to boom, Active Directory was no lon...

Data-Access-Governance-Before-and-After

The Top Five Reasons You May Have Dirty User Data

The Dangers Of Dirty User Data In Your Organization Every organization has dirty data somewhere. With the sheer number of identities your company has to manage, it’s easy for small errors to happen. Dirty data can really...