Maria Joyner

Stay Ahead of Hackers with User Access Reviews – Part 2

Stay Ahead of Hackers with User Access Reviews – Part 2

In our first post, we gave an overview of the User Access Reviews and Certification Campaign structure, the challenges it addresses, and guiding principles for implementing a successful program. In today’s blog, we will look at the benefits that organizations derive from implementing Access Reviews. As security teams evolve defensive tools and strategies to remove …

Stay Ahead of Hackers with User Access Reviews – Part 2 Read More »

Informative Cybersecurity Articles for Identity Management Professionals

Informative Cybersecurity Articles for Identity Management Professionals

International Law, Banks, and Employee Security headline this week’s digest of articles for Identity Management Professionals. Thanks for checking out this week’s digest of articles for Identity Management Professionals. Click here to view the healthcare-focused digest. Peruse our resources for webinars, case studies, infographics, and educational videos. Subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered Tuesdays at …

Informative Cybersecurity Articles for Identity Management Professionals Read More »

7 Must-Read Articles for Healthcare IAM Professionals, May 2021

7 Must-Read Articles for Healthcare IAM Professionals, May 2021

Cybersecurity blind spots, ransomware, and user access reviews headline this week’s digest of articles for Healthcare IAM professionals. Thanks for checking out the biweekly digest of articles for healthcare IAM professionals.  Peruse our resources section for webinars, infographics, and educational videos. You can subscribe to receive the biweekly dose of helpful Healthcare Cybersecurity Articles, delivered Tuesdays …

7 Must-Read Articles for Healthcare IAM Professionals, May 2021 Read More »

Stay Ahead of Hackers with User Access Reviews – Part 1

Stay Ahead of Hackers with User Access Reviews – Part 1

It is impossible for businesses to stay ahead of every cyber threat; yet, organizations need to take some measures to protect themselves. While cyber-attacks may be inevitable, thoughtful preparation is an essential activity that sets resilient organizations apart from their peers in managing risk, minimizing damage, and recovering quickly. What is the best way to …

Stay Ahead of Hackers with User Access Reviews – Part 1 Read More »

7 Articles for Identity Management Professionals, April 2021

7 Articles for Identity Management Professionals, April 2021

Ransomware, Governance, and Access Control headline this week’s digest of articles for Identity Management Professionals. Thanks for checking out this week’s digest of articles for Identity Management Professionals. Click here to view the healthcare-focused digest. Peruse our resources for webinars, case studies, infographics, and educational videos. Subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered Tuesdays at …

7 Articles for Identity Management Professionals, April 2021 Read More »

5 Articles for Healthcare Cybersecurity Professionals

5 Articles for Healthcare Cybersecurity Professionals

Infosec strategy, connected devices, and access control headline this week’s digest of articles for Healthcare Cybersecurity professionals. Thanks for checking out the biweekly digest of articles for healthcare cybersecurity professionals.  Peruse our resources section for webinars, infographics, and educational videos. You can subscribe to receive the biweekly dose of helpful Healthcare Cybersecurity Articles, delivered Tuesdays at …

5 Articles for Healthcare Cybersecurity Professionals Read More »

7 Types of Identity Management Access Controls

7 Types of Identity Management Access Controls

According to the Verizon 2020 Data breach Investigations report, brute force attacks and the use of stolen or lost credentials are the root cause for more than 80% of breaches. This makes having a strong information security program an essential capability for organizations today. Identity and Access Management is a vital part of information security …

7 Types of Identity Management Access Controls Read More »

9 Identity Management Articles for Cybersecurity Professionals

9 Identity Management Articles for Cybersecurity Professionals

IAM, APTs, and Self-Sovereign Identity headline this week’s digest of  Identity Management articles for Cybersecurity Professionals. Thanks for checking out this week’s digest of articles for Cybersecurity Professionals. Click here to view the healthcare-focused digest. Peruse our resources for webinars, case studies, infographics, and educational videos. Subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered Tuesdays at …

9 Identity Management Articles for Cybersecurity Professionals Read More »

7 Articles for Healthcare Cybersecurity Professionals, April 2021

7 Articles for Healthcare Cybersecurity Professionals, April 2021

HIPAA, cyber threats, and the latest Varonis report headline this week’s digest of articles for Healthcare Cybersecurity professionals. Thanks for checking out the biweekly digest of healthcare cybersecurity articles.  Peruse our resources section for webinars, infographics, and educational videos. You can subscribe to receive the biweekly dose of helpful Healthcare Cybersecurity Articles, delivered Tuesdays at 8 …

7 Articles for Healthcare Cybersecurity Professionals, April 2021 Read More »

6 Reasons You Should Get Started with an IAM Roadmap

6 Reasons You Should Get Started with an Identity Management Roadmap

An Identity Management Roadmap engagement assesses the current state of your IAM program, identifies challenges, and develops a clear plan to implement. Organizations that are considering refreshing their Identity Management (IAM) program or implementing IAM for the first time will benefit from an IAM Roadmap exercise. An IAM roadmap engagement takes the chaos out of …

6 Reasons You Should Get Started with an Identity Management Roadmap Read More »

Scroll to Top