Identity Management & Cybersecurity Resources

IAM & Cybersecurity Webinars, Case Studies,
Videos, Infographics, Books,
and more!

Watch On-Demand Webinars

Preventing Business Email Compromise

Preventing Business Email Compromise

Learn more about this threat from Derek Johnson Director, Security from OnSolve, and how to protect yourself and your organization from Business Email Compromise.
Watch Now
iam assessments define your path to success

How IAM Assessments Define Your Path to Success Webinar

In this webinar, you will learn how an IAM Assessment and Solution Roadmap can help your organization effectively plan for change so you can achieve ...
Watch Now
learning about policy based access control (pbac)

Learning about Policy Based Access Control (PBAC)

In this webinar, Ron Bowron (Idenhaus) and Mike Morley (PlainID) walk through the basics of Policy Based Access Control (PBAC).
Watch Now
Unlocking the Benefits of an Identity Management (IAM) Roadmap Webinar

Unlocking the Benefits of an Identity Management (IAM) Roadmap

Join Idenhaus to learn how to evaluate the needs of your organization (people, process, technology) and the steps you can take to build a comprehensive, ...
Watch Now
identity automation or governance

Which Comes First: Identity Automation or Governance?

When getting started with IAM, companies will need to decide whether to begin with identity automation or governance first. This webinar will explore both approaches ...
Watch Now
secure funding for your identity management program

How To Secure Funding for your Identity Management Program

If you are interested in securing IAM funding, this webinar is a great opportunity to get an experienced perspective and to get your questions answered.
Watch Now

Watch On-Demand Webinars

Preventing Business Email Compromise

Preventing Business Email Compromise

Business Email Compromise is a form of cybercrime where an attacker gains control of a victim’s business email account and imitates their identity to defraud the company and its employees. It is usually a spear phishing attempt where the top executive is targeted, and the organization’s data is exploited.

iam assessments define your path to success

How IAM Assessments Define Your Path to Success

In this webinar, you will learn how an IAM Assessment and Solution Roadmap can help your organization effectively plan for change so you can achieve ongoing excellence with your IAM program.

learning about policy based access control (pbac)

Learning about Policy Based Access Control (PBAC)

In this webinar, Ron Bowron (Idenhaus) and Mike Morley (PlainID) walk through the basics of Policy Based Access Control. PBAC offers an advanced framework to centrally manage permissions and provide assurance for the enterprise in a scalable solution. 

Unlocking the Benefits of an Identity Management (IAM) Roadmap Webinar

Unlocking the Benefits of an Identity Management (IAM) Roadma

Learn how to evaluate the needs of your organization (people, process, technology) and the steps you can take to build a comprehensive, convincing IAM Roadmap to guide your IAM program from concept to reality. 

identity automation or governance

Which Comes First: Identity Automation or Governance?

When getting started with IAM, companies will need to decide whether to begin with automation or governance first. This webinar explores both approaches and makes a case for which should come first.

secure funding for your identity management program

How To Secure Funding for your Identity Management Program

In this webinar, Hanno Ekdahl, Founder of Idenhaus Consulting, walks through the essentials of the ‘fundraising process’. If you are interested in securing IAM funding, this webinar is a great opportunity to get an experienced perspective.

View Idenhaus Case Studies

Global Brand Succeeds with IAM Strategy

A global beverage company had a complex architecture with security vulnerabilities that required a large number of IT staff to manage. Idenhaus conducted a detailed analysis of the user lifecycle and processes, existing IT systems, standards, and policies.

Bell Powers Ahead with IGA Assessment and Roadmap

Bell Textron, Inc needed a new approach to mature its IGA framework to improve efficiency and support its security objectives. The IGA assessment provided strong evidence that Bell’s legacy systems and processes were due for an overhaul.

Bell Takes Off with Identity Management (IGA)

Bell Textron, Inc. was challenged with selecting and implementing a modern IAM solution to provide new security capabilities and retire its legacy systems. This effort started with a review and re-design of Bell’s business process to provision users more effectively while supporting a sophisticated security model.

FPS Forges New Defenses with Cybersecurity Assessment

As company growth accelerated, Fire Protection Services (FPS) needed to assess their current operations and develop a strategic approach to maturing their cybersecurity posture. The objective of this cybersecurity assessment was to identify vulnerabilities, proactively address issues, and make FPS a ‘hard target’ that was unattractive to hackers. 

Major Hospital Embraces Role Based Access Control

A large mid-western hospital group had grown by acquisition and integration of new facilities. The resulting complex structure of hospitals, medical schools, and clinics has created a difficult environment for managing identities and access to critical clinical systems. Role based access control offered a better way to manage this complexity.

Project N95 Achieves NIST 800-171 Compliance

Project N95 needed an experienced partner to help implement the NIST SP 800-171 security framework, including defining and documenting policies, procedures, and plans. Given the strategic importance of establishing compliance, Project N95 chose to move forward with Idenhaus to lead the company through the compliance process. This engagement delivered Policy and Standards specifically mapped to the NIST SP 800-171 requirements.

Global Brand Succeeds with IAM Strategy

A global beverage company had a complex architecture with security vulnerabilities that required a large number of IT staff to manage. Idenhaus conducted a detailed analysis of the user lifecycle and processes, existing IT systems, standards, and policies.

Bell Powers Ahead with IGA Assessment and Roadmap

Bell Textron, Inc needed a new approach to mature its IGA framework to improve efficiency and support its security objectives. The IGA assessment provided strong evidence that Bell’s legacy systems and processes were due for an overhaul.

Bell Takes Off with Identity Management (IGA)

Bell Textron, Inc. was challenged with selecting and implementing a modern IAM solution to provide new security capabilities and retire its legacy systems. This effort started with a review and re-design of Bell’s business process to provision users more effectively while supporting a sophisticated security model.

FPS Forges New Defenses with Cybersecurity Assessment

As company growth accelerated, Fire Protection Services (FPS) needed to assess their current operations and develop a strategic approach to maturing their cybersecurity posture. The objective of this cybersecurity assessment was to identify vulnerabilities, proactively address issues, and make FPS a ‘hard target’ that was unattractive to hackers. 

Major Hospital Embraces Role Based Access Control

A large mid-western hospital group had grown by acquisition and integration of new facilities. The resulting complex structure of hospitals, medical schools, and clinics has created a difficult environment for managing identities and access to critical clinical systems. Role based access control offered a better way to manage this complexity.

Project N95 Achieves NIST 800-171 Compliance

Project N95 needed an experienced partner to help implement the NIST SP 800-171 security framework, including defining and documenting policies, procedures, and plans. Given the strategic importance of establishing compliance, Project N95 chose to move forward with Idenhaus to lead the company through the compliance process. This engagement delivered Policy and Standards specifically mapped to the NIST SP 800-171 requirements.
Global Brand Succeeds with Idenhaus

Global Brand Succeeds with IAM Strategy

A global beverage company had a complex architecture with security vulnerabilities that required a large number of IT staff to manage. Idenhaus conducted a detailed analysis of the user lifecycle and processes, existing IT systems, standards, and policies.

Idenhaus-Case Study-Bell-Powers-Ahead-IAM-Assessment

Bell Powers Ahead with IGA Assessment and Roadmap

Bell Textron, Inc needed a new approach to mature its IGA framework to improve efficiency and support its security objectives. The IGA assessment provided strong evidence that Bell’s legacy systems and processes were due for an overhaul.

Bell Identity Management

Bell Takes Off with Identity Management (IGA)

Bell Textron, Inc. was challenged with selecting and implementing a modern IAM solution to provide new security capabilities and retire its legacy systems. This effort started with a review and re-design of Bell’s business process to provision users more effectively while supporting a sophisticated security model.

Idenhaus Case Study Cybersecurity Assessment

FPS Forges New Defenses with Cybersecurity Assessment

As company growth accelerated, Fire Protection Services (FPS) needed to assess their current operations and develop a strategic approach to maturing their cybersecurity posture. The objective of this cybersecurity assessment was to identify vulnerabilities, proactively address issues, and make FPS a ‘hard target’ that was unattractive to hackers. 

Major Hospital Embraces RBAC

Major Hospital Embraces Role Based Access Control

A large mid-western hospital group had grown by acquisition and integration of new facilities. The resulting complex structure of hospitals, medical schools, and clinics has created a difficult environment for managing identities and access to critical clinical systems. Role based access control offered a better way to manage this complexity.

Project N95 Achieves NIST 800-171 Compliance

Project N95 needed an experienced partner to help implement the NIST SP 800-171 security framework, including defining and documenting policies, procedures, and plans. Given the strategic importance of establishing compliance, Project N95 chose to move forward with Idenhaus to lead the company through the compliance process. This engagement delivered Policy and Standards specifically mapped to the NIST SP 800-171 requirements.

Download Identity Management Infographics

Watch The Idenhaus Video Series

Get Your FREE Book

"RE-IMAGINING IDENTITY MANAGEMENT IN THE DIGITAL WORLD"

by Hanno Ekdahl

Get Your FREE Book

"RE-IMAGINING IDENTITY MANAGEMENT IN THE DIGITAL WORLD"

by Hanno Ekdahl

This book is filled with insightful content, backed by years of experience, to  help guide you in designing, choosing, and implementing the right IAM solution for your business.

Subscribe to our Newsletter

Scroll to Top