IT Courses at GCA TRAINING_____________

Chess is like leadership

How to Adapt As A Leader Based On Who You Are Leading

Leadership vs. Management One of the biggest misconceptions that people in positions of power seem to believe is that by landing themselves a leadership position, they inherently have the necessary skillset to sufficient...

security-risk-mitigation

The Circus Act of Balancing Business Optimization & Security Risk Mitigation

Juggling security risk mitigation and optimization  As an information technology leader, your job is equal parts of security risk mitigation and circus juggler. Not only is it your job to mitigate the ever-present threat...

Implementation-Services-Header

Data Access Governance: Before and After

Implementing A Proper Data Access Governance Solution It’s amazing what a properly deployed Data Access Governance solution can do for an organization. When I walked into our client’s office on a hot Texas morning, I kne...

Automating-Identity-Management-Processes-Dont-Go-it-Alone

Automating Identity Management Processes: Don’t Go it Alone

Identity Management Automation: Vendor Vs. In-House Solution Has someone from your organization approached you about automating manual identity management processes?  Let’s face it, there are many mundane tasks present i...

4-Keys-to-a-Successful-Identity-Management-Implementation

4 Keys to a Successful Identity Management Implementation

  Implementing A Successful Identity Management Strategy Are you looking to implement a solution for Identity Governance Administration (IGA), Identity and Access Management (IAM), or just plain old Identity Managem...

4-Key-Steps-to-Prepare-for-an-Identity-and-Access-Management-IAM-Rollout

4 Key Steps to Prepare for an Identity and Access Management (IAM) Rollout

Executing The Right Identity and Access Management (IAM) Rollout Strategy Active Directory used to be the standard for leveraging application identity storage. When the Internet began to boom, Active Directory was no lon...

Data-Access-Governance-Before-and-After

The Top Five Reasons You May Have Dirty User Data

The Dangers Of Dirty User Data In Your Organization Every organization has dirty data somewhere. With the sheer number of identities your company has to manage, it’s easy for small errors to happen. Dirty data can really...

The-Top-Five-Reasons-to-Consider-a-Hybrid-SIEM-Managed-Service

The Top Five Reasons to Consider a Hybrid SIEM Managed Service

Should I Consider A Hybrid SIEM Managed Service For My Organization? When it comes to managing your SIEM, it’s a round-the-clock undertaking. It can be difficult to set up the tools to ensure you’re getting the maximum b...

The-Intersection-of-PAM-IAM-Part-2-Password-Vaulting

The Intersection of PAM & IAM – Part 2 – Password Vaulting

The Importance Of Password Vaulting  In IAM & PAM In the previous article, Part 1 – Access Control was discussed as the first step in setting up a successful Privileged Access Management (PAM) program. Many peo...

Top-5-Identity-Management-Considerations-for-CISO-CIO-and-IT-Directors

Top 5 Identity Management Considerations for CISO / CIO and IT Directors

Important Elements Of Implementing An Identity Management Strategy In this article, I outline some of my top areas of consideration for Senior IT Managers and the CISO / CIO deciding on investments in Identity Management...