Hanno Ekdahl

Idenhaus specializes in Identity and Access Management (IAM) and Cybersecurity. We help our clients reduce the risk of security breaches, eliminate audit findings, enhance regulatory compliance (Sarbanes-Oxley, Gramm-Leach-Bliley, and HIPAA), and safeguard customer information. Twitter: @idenhaus

systems thinking

Systems Thinking and Organization Modus Operandi

Stop optimizing the parts instead of the whole. Learn how to apply Systems Thinking to your Identity Management strategy.   As organizations grow, they eventually cross a threshold where they can no longer afford to manually administer and manage user access; at this point, they must find a way to automate routine user administration tasks. …

Systems Thinking and Organization Modus Operandi Read More »

Idenhaus Biweekly

Idenhaus Biweekly: Systems Thinking, Neglecting IGA, and Healthcare Cybersecurity

Thanks for reading the Idenhaus Identity Mangement & Cybersecurity biweekly news digest. Every two weeks, we curate a selection of informative IAM, Identity Governance, Identity Management & Cybersecurity articles. Be sure to check out our new resources section with on-demand webinars, case studies, and educational videos. Subscribe to the Idenhaus biweekly newsletter here. Security Thought …

Idenhaus Biweekly: Systems Thinking, Neglecting IGA, and Healthcare Cybersecurity Read More »

systems-thinking

Using Systems Thinking to Handle Errors In Your IAM Solution

Working in the trenches in HR and IAM operations, it is very easy to lose sight of the big picture. When dealing with events on a daily basis, every event and decision is usually assessed individually, only weighing its immediate effects. This often leads to losing sight of the relationships between process improvement work and …

Using Systems Thinking to Handle Errors In Your IAM Solution Read More »

idenhaus-biweekly-data-quality

Idenhaus Biweekly: Data Quality, PAM, (Lack of) GDPR Compliance

Thanks for reading the Idenhaus biweekly news digest. Every two weeks, we curate a selection of insightful Access Management, IGA, Identity Management & Cybersecurity articles. We recently launched a new resources section with on-demand webinars, case studies, and educational videos. Subscribe to the Idenhaus biweekly newsletter here. Security Thought of the Week Taking a “Systems …

Idenhaus Biweekly: Data Quality, PAM, (Lack of) GDPR Compliance Read More »

Idenhaus-Biweekly_-8-Must-Read-Identity-&-Cybersecurity-Articles

Idenhaus Biweekly: 8 Must-Read Identity & Cybersecurity Articles

Thanks for reading the Idenhaus biweekly news digest. Every two weeks, we curate a selection of insightful Access Management, IGA, Identity Management & Cybersecurity articles. We recently launched a new resources section with on-demand webinars, case studies, and educational videos. Subscribe to the Idenhaus biweekly newsletter here.   Role Based Access Control (RBAC) and Systems …

Idenhaus Biweekly: 8 Must-Read Identity & Cybersecurity Articles Read More »

Role based access control rbac _ idenhaus-header

Role Based Access Control (RBAC) and Systems Thinking

As organizations grow, they become more complex and difficult to understand. One of the major breakthroughs in understanding this complexity is systems theory, which analyzes systems at the macro level (from the perspective of the whole system), its various components and the recurring patterns in the relationships between those components. One of the key tools …

Role Based Access Control (RBAC) and Systems Thinking Read More »

Idenhaus Biweekly_ RBAC, Healthcare Cybersecurity, Identity Management

Idenhaus Biweekly: RBAC, Healthcare Cybersecurity, Identity Management

Thanks for reading the Idenhaus Identity Management & Cybersecurity biweekly news digest. Every two weeks, we curate a selection of insightful Access Management, IGA, Identity Management & Cybersecurity articles. We recently launched a new resources section with on-demand webinars, case studies, and educational videos. Subscribe to our biweekly newsletter here.   Best Practices for Role Based Access …

Idenhaus Biweekly: RBAC, Healthcare Cybersecurity, Identity Management Read More »

best practices for role based access control

Best Practices for Role Based Access Control (RBAC)

Role Based Access Control (RBAC) is an advanced method for managing user access. RBAC is best suited for organizations that have a mature Identity Governance and Administration (IGA) solution in place. The underpinnings of RBAC begin with tight integration between an organization’s HRIS system, its IGA solution, and end-user applications. Well-defined user management processes with …

Best Practices for Role Based Access Control (RBAC) Read More »

Idenhaus Biweekly: Healthcare IAM, Access Control, and Privacy

Thanks for reading the Idenhaus Identity Management & Cybersecurity biweekly news bulletin. Every two weeks, we curate a selection of insightful Access Management, IGA, Identity Management & Cybersecurity articles. We recently launched a new resources section with on-demand webinars, case studies, and educational videos. Subscribe to our biweekly newsletter here.   One Year Later: How GDPR Continues …

Idenhaus Biweekly: Healthcare IAM, Access Control, and Privacy Read More »

Scroll to Top