Thanks for reading our biweekly digest of Identity Governance, Cybersecurity, and Access Management articles. We curate a diverse selection of IdM, IGA, privacy, and cybersecurity articles to help you navigate the rapidly-changing IT security landscape. Subscribe to our biweekly newsletter here.
This week’s news digest includes 8 informative identity governance and access management articles from late January 2019. Enjoy!
Now that we’ve had the opportunity to reflect on the conference as a whole, I want to highlight several themes that headlined #GartnerIAM 2018.
IoT security, insecure software, and data privacy among the top security and privacy TED talks from 2018.
The Machine Behind Identity Governance via Forbes
Enterprise organizations of all sizes rely on identity governance to enforce strict policies that protect data from unwanted access. With the advent of identity and artificial intelligence (AI), it’s now easier to find the needles you didn’t even know you had in your haystack.
The updated guide is designed to help commercial and public sector entities of any size and in any part of the world align with the CSF by leveraging AWS services and resources.
Whether you’re an individual, organisation or company, you may be branded as a ‘controller’ or ‘processor’ of personal data. Check out this primer on GDPR for small business.
The 5 Trademarks of Agile Organizations via McKinsey
Research shows that agile organizations have a 70% chance of being in the top quartile of organizational health, the best indicator of long-term performance.
Emerging standards and frameworks such as Gartner CARTA, Zero Trust, NIST SP 800 and IDSA provide guidelines, but how organizations manage identity and access management in 2019 is what matters most.
Many organizations deploy Identity & Access Management (IAM) solutions based on surprisingly vague, simplistic, and unrealistic business cases that do not do justice to the multi-million dollar investments they require.
Check out our previous digest of Identity & Access Management articles here: 9 Insightful Cybersecurity & Access Management Articles, January 2019
An IAM Assessment is a quick, expert evaluation of your environment that identifies and addresses the most common issues organizations face when implementing a solution.
This is ideal for organizations that:
- Are struggling to get their IAM solutions deployed
- Have a misalignment between their processes and technology
- Have an immature IAM solution with too many workarounds
- Companies that want to accelerate their IAM programs
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us