Executive Order 14028 Workshop

Are you aware of suspicious user and sign-in behaviour in your environment? Are you threatened by ongoing suspicious requests?

About the workshop

Identity is today’s control plane for digital transformation. Organizational barriers are blurring between who is in and out of your network. Cloud apps and the increasing use of personal devices and remote work mean that data is no longer centralized behind traditional network security.

With identity attacks on the rise, this workshop will show you how to stop tomorrow’s data breaches by securing identities today.

We will help you find identity risks happening now in your environment, gain insights into your application landscape, and improve your identity security posture.

  1. Understands how Azure Active Directory address the Executive Order 14028 requirements
  2. Gain insights into apps used in your environment – even ones unsanctioned by IT
  3. Understand how to prevent identities from being compromised
  4. Learn how to reduce costs and improve business agility and security with simplified app access
  5. The workshop fee is funded by Microsoft and delivered by FITTS consultants

The foundation of cybersecurity is to quickly and accurately identify authorized users and give them proper access to the information and tools they need to do their job. Our goal is to provide you with tools to protect your authorized users’ identities so you can authenticate credentials and manage file access while still giving users the freedom to collaborate with others.

We’ll work with you to:

  • Mitigate your access risk by protecting, monitoring, and auditing access to critical assets through identity governance
  • Outline strong authentication methods like native certificate-based authentication and phishing resistant multi factor authentication
  • Help you understand situations where your identity might be compromised with remediation steps
  • Improve migration and governance to align with Executive Order 14028 guidance

The workshop is intended for security decision-makers such as: 

  • Chief Information Security Officer (CISO)
  • Chief Information Officer (CIO)
  • Chief Security Officer (CSO)
  • Identity and or Application owners/decision-makers
  • IT Security
  • IT Operations
  • Security Architect
  • Security Engineers
  • Application business owners

This workshop is funded by Microsoft and delivered by FITTS


When it comes to compliance, you need an experienced partner. Request a fully funded Executive Order 14028 Workshop today.

*Microsoft funding of $2,500 based on meeting Microsoft's eligibility criteria.