systems thinking

Systems Thinking and Organization Modus Operandi

Stop optimizing the parts instead of the whole. Learn how to apply Systems Thinking to your Identity Management strategy.   As organizations grow, they eventually cross a threshold where they can no longer afford to manually administer and manage user access; at this point, they must find a way to automate routine user administration tasks.

Read More »
Idenhaus Biweekly

Idenhaus Biweekly: Systems Thinking, Neglecting IGA, and Healthcare Cybersecurity

Thanks for reading the Idenhaus Identity Mangement & Cybersecurity biweekly news digest. Every two weeks, we curate a selection of informative IAM, Identity Governance, Identity Management & Cybersecurity articles. Be sure to check out our new resources section with on-demand webinars, case studies, and educational videos. Subscribe to the Idenhaus biweekly newsletter here. Security Thought

Read More »
systems-thinking

Using Systems Thinking to Handle Errors In Your IAM Solution

Working in the trenches in HR and IAM operations, it is very easy to lose sight of the big picture. When dealing with events on a daily basis, every event and decision is usually assessed individually, only weighing its immediate effects. This often leads to losing sight of the relationships between process improvement work and

Read More »
idenhaus-biweekly-data-quality

Idenhaus Biweekly: Data Quality, PAM, (Lack of) GDPR Compliance

Thanks for reading the Idenhaus biweekly news digest. Every two weeks, we curate a selection of insightful Access Management, IGA, Identity Management & Cybersecurity articles. We recently launched a new resources section with on-demand webinars, case studies, and educational videos. Subscribe to the Idenhaus biweekly newsletter here. Security Thought of the Week Taking a “Systems

Read More »
getting-handle-user-data_Idenhaus-Consulting

Mini Case Study: Getting a Handle on User Data

Nicole Keaton Hart and Hanno Ekdahl share a mini case study on the importance of establishing a system of record to maintain user data quality.   Identity Management (IAM) is built around the concept of a system of record and establishing a “Gold Standard” data set for each user that is: 1) accurate, 2) actively

Read More »
Idenhaus-Biweekly_-8-Must-Read-Identity-&-Cybersecurity-Articles

Idenhaus Biweekly: 8 Must-Read Identity & Cybersecurity Articles

Thanks for reading the Idenhaus biweekly news digest. Every two weeks, we curate a selection of insightful Access Management, IGA, Identity Management & Cybersecurity articles. We recently launched a new resources section with on-demand webinars, case studies, and educational videos. Subscribe to the Idenhaus biweekly newsletter here.   Role Based Access Control (RBAC) and Systems

Read More »