During our webinars we share best practices and lessons learned during our numerous engagements. If you want to successfully be in control of user access and learn how to leverage the Brainwave Identity GRC software to that purpose, this is the best place!
Next Live Webinar Sessions
Click on the “Detail” button to register:
Webinar – How To Implement True Privileged Access Governance?
Do you want to know our secrets regarding effective privilege governance?
Find out how to easily demonstrate compliance and mitigate the risks associated with your privileged accounts.
Webinar – Privileged Access Governance: Challenges and Best Practices.
Privileged accounts are the keys to the kingdom!
They are the ones that control your systems and resources, which is why auditors are particularly interested in them. But privileged accounts are also quite often the target of cyber attacks for this very reason.
This is why strong and effective governance of privileged accounts is so essential.
Webinar – Can IAM Be Done without Identity Analytics?
IAM without Identity Analytics is like driving without a steering wheel or without headlights at night.
Identity Analytics allows you to map all the resources and applications of the company, to thoroughly analyze who has access to what, to calculate a risk score for each access, and to make recommendations that help with decision-making.
Webinar – Access Review Automation: Feedback from ADP
Access Review Automation at ADP: Carte Blanche to Pierre Dumas.
We bring you the exceptional testimony of Pierre Dumas, IT Security and Compliance Director at ADP, EMEA. Pierre talks about how ADP implemented the access review, how it was optimized, and how the teams were involved.
Webinar – Periodic or Continuous Access Reviews: 2 Strategies
There are two ways of doing access right reviews. The most common is the periodic review which shows compliance at a specific date in time. However, the continuous review strategy is actually more important from a best practice standpoint because it reduces the risks associated with access information.
To find out more about these two ways of doing access reviews, click on the image.
Webinar – Implementing a Role Mining Project: Customer Experience and Feedback from Wavestone
Wavestone shares its user experience and discuss the implementation of a Brainwave Role Mining project for one of its hospital clients.
Watch this webinar to learn the details of how to gather and clean data, define a project scope, and create role modeling.
Webinar – Role Mining: How to
What are the main stages to follow to build quality roles?
Watch this webinar to discover all best practices and identify the main pitfalls of a Role Mining project.
Webinar – Q&A Role Mining: everything you need to know
The floor is yours! Ask us anything you ever wanted to know about Role Mining: its definition, the stakes, the mechanics and best practices.
Webinar – Make Your User Access Reviews More Efficient with Brainwave
Intuitive, efficient and easy to use: these are a few of the words that our customers use to describe their experience with the Brainwave GRC solution as their choice for performing their automated access reviews.
Do you wonder what the tool looks like, how it works and why it is so popular among our users?
To find out, join our webinar, and we will demonstrate how the tool is used with a variety of customer use cases.
Webinar – User Access Review implementation and benefits
After a short recap on why to automate User Access Revue, discover the best practices used in implementing a User Access Review process in addition to key customer use cases and the advantages they received in using Brainwave’s expertise.
Live Q&A session – User Access Review
After a short introduction on Access Review and what’s at stake, our CEO and CTO answer to all your questions about the benefits and the implementation of a UAR process.
With this webinar, learn all you ever wanted to know about User Access Review automation!
How to implement true Privileged Access Governance
Boost your PAM program to implement true Privileged Access Governance.
Do you know who has access to your resources? Are you aware of all the privileged accounts in your organization? Are your employees involved in your PAM program?
With this webinar, learn how Brainwave gives you 360° visibility of your privileged accounts so you don’t miss a thing!
How to implement IT General Controls
The purpose of ITGCs or IT General Controls is to protect information against unauthorized use, disclosure or modification and against any damage or loss of data.
The implementation of these controls is a regulatory obligation for large companies.
With this webinar, discover how Brainwave iGRC can help you meet these control and compliance requirements.
Deploying a User Access Review initiative
Learn about the organizational and technical considerations to set up a User Access Review (UAR) process: process flow, pitfalls to avoid, implementation strategies, tips for managing change and performance indicators.
Access Review & Remediation pains and solutions
To avoid access review inherent pitfalls as well as ensure compliance to regulations and to your internal company policies, register to discover the best practices for a successful implementation and industrialisation of your reviews with Brainwave Identity GRC.
Active Directory & Identity Governance
Discover what is at stakes regarding Active Directory, the cornerstone of your digital transformation, and how Booster for Active Directory makes it possible to visualize, contextualize, and analyze the risks related to access within all of your Active Directory domains and to produce reports and dashboards designed to improve the situation.
Logical access control for financial systems
Discover how to automate your controls including SoD controls and efficiently ensure your security policy’s implementation in order to easily reduce and manage your fraud and compliance risks.
Identity Governance and unstrucured data
Discover with Booster Data Governance how to start building a full inventory of your unstructured data access, tag shared folders with sensitive and personal data, retrieve the identities in the company that can access to this data, understand the reason why and check the legitimacy of these access.
Internal Control automation & GRC Analysis
Discover how to automate controls with Brainwave GRC, especialy SoD controls and reduce fraud risks from your financial systems.