IT Courses at GCA TRAINING_____________


Why You Should Expect the Unexpected During Access Reviews

There are many terms for Identity Governance (like Access Reviews Recertifications, Certifications, etc.) but they all boil down to essentially the same definition: the process to review access assigned to identities at ...


Zero Trust Implementation:
The First Step

What is Zero Trust? Zero Trust is the idea of a framework that is built around the premise of continuous validation: always questioning who someone is and what they want to do. In a zero trust model, you assume every use...

Copy of [GCA] Social Post #11 - Blog #11 - Zero Trust & Rolling Stones Concert

What The Rolling Stones Teaches Us About Zero Trust

One of the biggest roadblocks to effective IT is a lack of understanding throughout the organization. At GCA, we often use analogies to explain complicated methodologies to non-technical stakeholders. With this approach, the key concepts can be easily grasped and technical details like “Layer 7 Security” can be reserved for technical discussions. In this example, we’ll use a Rolling Stones concert to demonstrate zero trust in a way that is accessible to everyone at your organization. 


Cyber security network. Padlock icon and internet technology networking. Businessman protecting data personal information on tablet and virtual interface. Data protection privacy concept. GDPR. EU.

Leverage SailPoint IdentityIQ to Meet Use Cases

Gartner ranked SailPoint IdentityIQ (IIQ) as one of the top IGA tools on the market. This article will look at some lightweight customization that SailPoint has built into its product you can use in your SailPoint instan...

Data protection and insurance. Concept of business security, safety of information from virus, crime and attack. Internet secure system.

Top 3 Reasons Why You Need IAM Experts

Third-party research tells us that more than 50% of first-time IAM projects fail. For 4 out of 5 projects that do get past implementation, executives believe they do not deliver enough value. This is where an IAM expert ...


Evaluating the Limits of Data Governance Policies

Limits In IAM The Limit is a mathematical construct that describes what the output of a function does, given that the input is behaving in a certain way. Evaluating limits is a useful way to determine what happens to the...


3 Steps to Success
for IAM Program Buy-In

The first step to any IAM initiative is obtaining buy-in from stakeholders. The core challenge in communicating IAM initiatives is that they are highly technical, yet the stakeholders have varying technical capabilities....


Success Story: Identity Governance in a Large Healthcare Organization

Many organizations describe their Active Directory as a mess or a disaster. If you feel the same way, you’re not alone. Read on to learn how GCA helped a large healthcare organization get their systems in order with iden...


Capital One’s Story: The $80 Million Price of Not Following Best Practices

There are big fines waiting out there for organizations that do not take information security seriously. In 2019, Capital One paid an $80 million civil penalty for its role in a security breach that exposed the personal ...


How Better Password Management Creates Better Employee Output

According to Gartner, between 20% and 50% of all IT Help Desk calls are for password resets. For the end-user, this can be an extremely disruptive and frustrating process. As identity management specialists, GCA has seen...

Call Now ButtonTalk To Our CTO Now