You need to enable JavaScript to run this app.
Home Events Best Practices Webinar Cornerstone Event Who Has Access? Auditing Groups and Security Roles in Cornerstone

Who Has Access? Auditing Groups and Security Roles in Cornerstone

Over time, LMS groups and security roles can become outdated, over-permissioned, or misaligned with evolving business needs. In this Best Practices webinar, we’ll walk through a step-by-step approach to auditing your Cornerstone groups and security roles, identifying unused or risky permissions, and realigning access with current organizational requirements.

This session is ideal for LMS administrators looking to strengthen security, improve system efficiency, and gain greater confidence in their Cornerstone setup.

Presenters

Date

Jan 28 2026
Expired!

Time

Eastern
1:00 pm – 2:00 pm

Organizer

Adam Philip
Adam Philip
Email
aphilip@eskillz.com

Virtual Event Producer | MarTech Specialist | USAF Veteran

Who Has Access? Auditing Groups and Security Roles in Cornerstone

Over time, LMS groups and security roles can become outdated, over-permissioned, or misaligned with evolving business needs. In this Best Practices webinar, we’ll walk through a step-by-step approach to auditing your Cornerstone groups and security roles, identifying unused or risky permissions, and realigning access with current organizational requirements.

This session is ideal for LMS administrators looking to strengthen security, improve system efficiency, and gain greater confidence in their Cornerstone setup.

Date

Jan 28 2026
Expired!

Time

Eastern
1:00 pm – 2:00 pm

Presenters

Organizer

Adam Philip
Adam Philip
Email
aphilip@eskillz.com

Virtual Event Producer | MarTech Specialist | USAF Veteran

  • Register