Idenhaus Biweekly: Access Management, GDPR Compliance, and Blockchain-Based IAM

Share on linkedin
Share on twitter
Share on facebook

Idenhaus Biweekly Access Management, GDPR Compliance

Thanks for reading the Idenhaus biweekly digest of insightful Access Management, GDPR compliance, & Cybersecurity articles. We curate a diverse selection of IAM, RBAC, and Identity Governance articles to help you navigate the rapidly-changing IT security landscape. Subscribe to our biweekly newsletter here.

 

What You Need to Know About GDPR Compliance via Idenhaus

Senior privacy consultant Jodi Daniels shares why consumer trust is a key business driver for General Data Protection Regulation (GDPR) compliance.

Incident Response: 3 Easy Traps & How to Avoid Them via DarkReading

Sage legal advice about navigating a data breach from a troubleshooting cybersecurity outside counsel.

7 Access Management Best Practices for Enterprises via SolutionReview

What are the 7 access management best practices for enterprises? How can your enterprise ensure full-fledged identity and access management and cybersecurity across a growing IT infrastructure?

OMB updates identity management policies via GCN

In a push to better adapt to changing technologies, the Office of Management and Budget issued a memo updating its identity management policies.

How four promising trends could aid patient matching via HealthDataManagement

The issue of inadequate patient matching and duplicate records has grown increasingly complex as more data is generated and more applications are introduced into the healthcare environment.

Hyperledger’s Brian Behelendorf on Identity Management via Blockchain Investing News

Hyperledger Technologies is an open source blockchain organization that includes 250 businesses operating within its umbrella.

How Identity Management Makes GDPR Compliance Easier  via Idenhaus

IAM allows organizations to document who has access to what, and determine when and why they were granted access. Having this technology in place means companies can control and govern their identities, thereby protecting their sensitive data.

 

GDPR Overview

GDPR: First Year in Review and Sneak Peak to the Year Ahead [Webinar] via Idenhaus

GDPR swept the globe last after its debut in May 2018. It changed how organizations market, conduct business, process data, and created numerous new cookie banners! As GDPR celebrates its first birthday, what are the relevant lessons that businesses should learn from? We’ll also cover what companies should expect as GDPR toddles into its second year.

Role Based Access Control Best Practices [Webinar] via Idenhaus

In this webinar on July 18, 2019, we will walk through our RBAC methodology, discuss lessons learned, and share best practices that you can employ in your organization. Space is limited!

 

Check out our previous digest of insightful Identity Governance and access management articles here: Idenhaus Biweekly: IAM Roadmap, M&A Due Diligence, and Upcoming Webinars

 


An IAM Assessment is a quick, expert evaluation of your environment that identifies and addresses the most common issues organizations face when implementing a solution.

This is ideal for organizations that:

  • Are struggling to get their IAM solutions deployed
  • Have a misalignment between their processes and technology
  • Have an immature IAM solution with too many workarounds
  • Companies that want to accelerate their IAM programs

Click here to learn more about the Identity and Access Management Assessment.

 

Follow @Idenhaus on Twitter and subscribe to our biweekly newsletter.

 


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Share on twitter
Share on linkedin
Share on facebook
Share on pocket
Share on email

Leave a Comment

Your email address will not be published. Required fields are marked *