Identity Management Biweekly: 9 Must-Read IAM & Cybersecurity Articles

Share on linkedin
Share on twitter
Share on facebook

Identity Management Biweekly

Thanks for reading the Idenhaus Identity Management biweekly news digest. Every two weeks, we curate a selection of informative IAM, Data Governance, Identity Management & Cybersecurity articles. Be sure to check out our new resources section with on-demand webinars, case studies, and educational videos.

Subscribe to the Idenhaus biweekly newsletter here or the healthcare IT newsletter here.

Security Thought of the Week

It is important to understand that an organization’s capabilities come from a combination of technology, people, and process. Investments across all of these areas will more reliably deliver benefits than investments in IT alone.

Identity Management Biweekly: 9 Must-Read IAM & Cybersecurity Articles

 

Identity Management Success Starts with Your Stakeholders via Idenhaus

To build confidence in your IAM program, it is important to spend time at the beginning of the project to assess the current state, identify key pain points, document business drivers, and develop an IAM roadmap.

 

In Healthcare, A Strong Change Management Plan Starts with Buy-In via TechTarget

The tenets of a good change management plan are to engage with stakeholders early, clearly communicate why the technology investment is necessary, and establish a team to help lead the implementation.

 

The Power of IAM via ITWeb

With IAM solutions in place, you would have the functionality, security and access for users for future deployment of applications to accommodate the business’ growth, and not only for regulatory circumstances.

 

Data-Driven Health Care: Reaping Benefits Without Risking a Breach via SecurityBoulevard

As healthcare is now more vulnerable to cybersecurity attacks from connected devices than ever, is it possible to bring the benefits of technology to patients whilst effectively managing security?

 

How identity management can aid efforts involving PDMP databases via HealthDataManagement

Using enterprise identity solutions in conjunction with prescriptive analytics and machine learning can help organizations leverage prescription data to anticipate risk and identify patterns with a high probability of abuse.

 

Security and compliance gaps of ineffective employee onboarding and offboarding via HelpNetSecurity

Just 15% of employees have all the resources they require to be productive on day one, further, more than half (52%) of IT professionals know someone who still has access to a former employer’s applications and data.

 

Healthcare organizations accounted for 79 percent of ransomware strikes this year via CSO

Healthcare employees should be extremely vigilant in confirming the source of all emails that are sent to their personal and corporate email inboxes. Emails that urgently request a password change, patient data, or a link be clicked should be approached with extreme caution.

 

Digital Identity Management: 5 Ways to Win Customer Trust via SecurityBoulevard

In business, digital identity management primarily refers to the way a customer’s personal information is safely collected, stored, and accessed. While this may appear simple, many businesses fall prey to misconceptions about building or managing a customer’s digital identity.

 

How a Solution Roadmap Aligns IT and Business Strategy  via Idenhaus

The simplest and most effective way to link your business strategy with your IAM program is to build a solution roadmap. The process to create a roadmap requires input from both technical and business stakeholders and makes the implicit explicit.

 

Check out our previous Identity Management Biweekly: Identity Management Biweekly: New SIM Hack, IAM Roadmaps, Healthcare Cybersecurity

 

 

Upcoming Webinar: How to Secure Funding for Your IAM Program

Secure Funding for your IAM Program

If you are new to getting an IAM program funded, you may not feel comfortable talking to executives about the value the program brings to the organization. You may even think that a single meeting with your executive team will be enough to pitch the idea and get your budget approved on the spot.

Time for a reality check!

In this webinar, Hanno Ekdahl, Founder of Idenhaus Consulting, will take you through the essentials of the ‘fundraising process’. If you are interested in securing IAM funding, this webinar is a great opportunity to get an experienced perspective and to get your questions answered.

Can’t make this webinar on the scheduled day? No worries! Register anyway to receive the link to the webinar recording and listen later at your convenience.

Reserve your spot today!

 

 

Follow @Idenhaus on Twitter and subscribe to our Identity Management biweekly or our healthcare IT biweekly newsletter.

 


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Share on twitter
Share on linkedin
Share on facebook
Share on pocket
Share on email

Leave a Comment

Your email address will not be published. Required fields are marked *