Who Has Access? Auditing Groups and Security Roles in Cornerstone
Over time, LMS groups and security roles can become outdated, over-permissioned, or misaligned with evolving business needs. In this Best Practices webinar, we’ll walk through a step-by-step approach to auditing your Cornerstone groups and security roles, identifying unused or risky permissions, and realigning access with current organizational requirements.
This session is ideal for LMS administrators looking to strengthen security, improve system efficiency, and gain greater confidence in their Cornerstone setup.
Presenters
-
Andrew TheisenSenior Consultant, eSkillzSenior Consultant, eSkillz
-
Tanya TiptonSenior Consultant, eSkillzSenior Consultant, eSkillz
Who Has Access? Auditing Groups and Security Roles in Cornerstone
Over time, LMS groups and security roles can become outdated, over-permissioned, or misaligned with evolving business needs. In this Best Practices webinar, we’ll walk through a step-by-step approach to auditing your Cornerstone groups and security roles, identifying unused or risky permissions, and realigning access with current organizational requirements.
This session is ideal for LMS administrators looking to strengthen security, improve system efficiency, and gain greater confidence in their Cornerstone setup.
Presenters
-
Andrew TheisenSenior Consultant, eSkillzSenior Consultant, eSkillz
-
Tanya TiptonSenior Consultant, eSkillzSenior Consultant, eSkillz
-
Register