With such heightened scrutiny around cybersecurity threats in today’s world, ensuring all applications are as secure as possible is absolutely necessary. Utilizing the proper authentication and authorization frameworks to grant access to the proper set of users is undoubtedly a vital part of that. But is that enough? Whether you are operating within the cloud or on-premises deployment, what else can be done to protect your assets from a rogue user or application such that you can operate with a zero-trust model in mind? Join us to discuss various techniques, from limiting network communication to restricting allowed application-level permissions, for keeping your SAS Viya environment secure.
It's finally time to hack! Remember to visit the SAS Hacker's Hub regularly for news and updates.
SAS Explore 2023 presentations are now available! (Also indexed for search at lexjansen.com!)
View all available SAS Explore content by category: