IAM

Why Zero Trust Succeeds When Strategic Leadership Is Present

Why Zero Trust Succeeds when Strategic Leadership is Present By Leah Livingston Idenhaus attended the Cybersecurity and Privacy conference hosted by EDUCAUSE in Bellevue, Washington earlier this month. Focused on higher education, the conference facilitated sessions from university leaders and cybersecurity vendors across the country, sharing knowledge ranging from recent technology implementations and challenges in …

Why Zero Trust Succeeds When Strategic Leadership Is Present Read More »

Gartner 2023 Case Study: Seattle Children’s Improves Quality Of Life, Reduces Burnout With Access Management

Gartner 2023 Case Study: Seattle Children’s Improves Quality Of Life, Reduces Burnout With Access Management By Addy Agee Seattle Children’s Hospital has taken steps to improve the quality of life for their clinicians and reduce burnout by implementing identity and access management (IAM) solutions. Dr. Zafar Chaudry, the Senior VP and Chief Digital and Information …

Gartner 2023 Case Study: Seattle Children’s Improves Quality Of Life, Reduces Burnout With Access Management Read More »

GartnerIAM 2023: How to be Successful with Privileged Access Management

GartnerIAM 2023: How to be successful with Privileged Access Management By Hanno Ekdahl Idenhaus attended this Gartner session on privileged access management (PAM) led by Felix Gaehtens, and it was an excellent primer on how to think about privileged accounts, access management/controls around those accounts, how to approach a PAM implementation, and the continuous commitment …

GartnerIAM 2023: How to be Successful with Privileged Access Management Read More »

Understanding Identity Threat Detection & Response (ITDR): A Comprehensive Approach to Cybersecurity

Understanding Identity Threat Detection & Response (ITDR): A Comprehensive Approach to Cybersecurity Do you ever stop to think about how much sensitive information your organization has, and how you’re protecting it? With cyber threats on the rise, it’s more important than ever to take a proactive approach to securing your identities and access controls. That’s …

Understanding Identity Threat Detection & Response (ITDR): A Comprehensive Approach to Cybersecurity Read More »

Does Your Organization Need An IAM Strategy?

  Do You Need An IAM Strategy? There is a well-known management book titled “What got you here, won’t get you there”. The basic premise is that future success begins with a commitment to continuous improvement, especially for those people who have already achieved an initial level of success. The central imperative is to challenge …

Does Your Organization Need An IAM Strategy? Read More »

Making the Case for Zero Trust

What Is Perimeter Security? Before Zero Trust, most organizations relied on corporate-issued devices running on the local network. Most IT security models were based on protecting an internal, trusted network that was connected to an external, untrusted network. This security model is referred to as ‘perimeter security’ and it is a style of defense much …

Making the Case for Zero Trust Read More »

Cybersecurity updates

Fresh Reading for IAM Professionals, September 2021

Join us as we take a tour of the news surrounding cyber security. From the latest cryptocurrency security struggles, to the arguments for and against cyber insurance. Does it help, or is it actually doing more harm now than good?  Thanks for checking out our biweekly digest of articles for Identity Management Professionals. Click here …

Fresh Reading for IAM Professionals, September 2021 Read More »

Scroll to Top