Inside DigitalOcean’s SOX Compliance Playbook
  • /images/companies.png

    Code Story with Special Guest Alex Bovee

    Our CEO Alex Bovee had the pleasure of being a guest on Code Story, a podcast featuring tech leaders, their stories, and the products they created, with host Noah Labhart, co-founder and CTO at Veryable.  Hear more about Alex's baground and the origin of ConductorOne in this episode.
  • /images/invited-by.png

    The CTO Show with ConductorOne's Paul Querna

    How does cybersecurity and identity management intersect to create a safer digital environment for businesses? Paul Querna, our CTO and co-founder, joined Mehmet Gonullu on the CTO Show to discuss exactly that and to share his personal journey and insights into the world of cybersecurity and startups.
  • /images/risky-biz-talks.png

    RISKY.BIZ Podcast with ConductorOne's Alex Bovee

    Identity is messy and unfortunately, still the leading vector for breaches in enterprises today. Our CEO Alex Bovee breaks down the importance of strong identity and permission management as well as the origin of ConductorOne on a Snake Oilers episode of the Risky Biz Podcast.
  • /images/access-governance-the-automation-evolution.png

    Access Governance: The Automation Evolution

    The SaaS-pocalypse is here – hundreds of apps each with their own permissions model means thousands of access grants to manage. Hear our CEO Alex Bovee live from the 2023 GRC Conference in Las Vegas talk about why we are moving away from traditional identity governance and how ConductorOne is paving the way for modern IGA and access management platforms. 
  • /images/sans-cyber-solutions-zero-trust-least-privilege-access.png

    SANS Cyber Solutions Zero Trust: Least Privilege Access

    Least Privilege Access - The most important, yet out of reach, pillar of zero trust. The principle of least privilege is the north star for workforce access management, but can feel out of reach for most.
  • /images/rethinking-identity-governance.png

    Rethinking Identity Governance

    SaaS is eating the world even more than we think. Companies are dealing with SaaS sprawl: hundreds of apps distributed across different owners that store sensitive data and which are used to orchestrate critical business workflows.
  • /images/cybarr-chats-best-practices-for-access-reviews.png

    cyBARR Chats: Best Practices for Access Reviews

    User access reviews are an essential part of creating a comprehensive governance and risk management strategy for companies to stay both secure and compliant. But what exactly are they, why should you do them, and how do you implement them?
Previous 1 2
/images/newsletter-3.png

Stay in touch

The best way to keep up with identity security tips, guides, and industry best practices.