Recently I had to present my personal thoughts on how we should implement a hybrid IAM scenario and the Cybersecurity considerations we should have when doing so.

Attaching my slideshow with some thoughts.

Loader Loading…
EAD Logo Taking too long?

Reload Reload document
| Open Open in new tab

Let me know if any queries.

Categories: Misc


Leave a Reply

Avatar placeholder

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.