Identity Management & Cybersecurity Resources

IAM & Cybersecurity
Webinars, Case Studies,
Videos, Books,
& more!

Watch Our On-Demand Webinars

Preventing Business Email Compromise

Preventing Business Email Compromise

In 2019, Victims of Business Email Compromise scams reported $1.78 billion in losses to the FBI’s Internet Crime Complaint Center. Learn more about this threat from Derek Johnson Director, Security from OnSolve, and how to protect yourself and your organization from business email compromise.

Unlocking the Benefits of an Identity Management (IAM) Roadmap Webinar

Unlocking the Benefits of an Identity Management (IAM) Roadmap

Learn how to evaluate the needs of your organization (people, process, technology) and the steps you can take to build a comprehensive, convincing IAM Roadmap to guide your IAM program from concept to reality. 

identity automation or governance

Which Comes First: Identity Automation or Governance?

When getting started with IAM, companies will need to decide whether to begin with automation or governance first. This webinar will explore both approaches and make a case for which should come first.

secure funding for your identity management program

How To Secure Funding for your Identity Management Program

In this webinar, Hanno Ekdahl, Founder of Idenhaus Consulting, will take you through the essentials of the ‘fundraising process’. If you are interested in securing IAM funding, this webinar is a great opportunity to get an experienced perspective.

Successfully-Integrating-HR-Processes-with-Identity-Management

Successfully Integrating HR Processes with IAM

IAM deployments can be complicated, involving people, processes, and technology across the entire business. Get expert insight on the best practices in process alignment for a successful IAM deployment.

Identity-Management-Overcoming-Data-Quality-Challenges

Overcoming Data Quality Challenges in IAM

Many organizations experience the hidden costs of low-quality user data, which makes automating routine Identity Management and provisioning tasks difficult and drives unnecessary operational and support costs. 

Idenhaus Case Studies

Idenhaus Case Study Cybersecurity Assessment

FPS Forges New Defenses with Cybersecurity Assessment

As company growth accelerated, Fire Protection Services (FPS) needed to assess their current operations and develop a strategic approach to maturing their cybersecurity posture. The objective of this cybersecurity assessment was to identify vulnerabilities, proactively address issues, and make FPS a ‘hard target’ that was unattractive to hackers. 

Idenhaus-Case Study-Bell-Powers-Ahead-IAM-Assessment

Bell Powers Ahead with IGA Assessment and Roadmap

Bell Textron, Inc needed a new approach to mature its IGA framework to improve efficiency and support its security objectives.  The IGA assessment provided strong evidence that Bell’s legacy systems and processes were due for an overhaul. By prioritizing and presenting the business opportunities and requirements gathered during stakeholder  interviews, Bell was able to convince its leadership to move forward to realize the benefits of the IGA solution.

Bell Identity Management

Bell Takes Off with Identity Management (IGA)

Bell Textron, Inc. was challenged with selecting and implementing a modern IAM solution to provide new security capabilities and retire its legacy systems. This effort started with a review and re-design of Bell’s business process to provision users more effectively while supporting a sophisticated security model. This engagement impacted thousands of users, delivering a new technical platform and huge business impact. The project was awarded Textron’s Best Security Project in 2019.

Global Brand Succeeds with Idenhaus

Global Brand Succeeds with IAM Strategy

A global beverage company had a complex architecture with security vulnerabilities that required a large number of IT staff to manage. Idenhaus conducted a detailed analysis of the user lifecycle and processes, existing IT systems, standards, and policies. We compared the current environment to the desired end state – a single, central Identity Store to manage all users across enterprise systems – and developed a phased, strategic approach for a new identity infrastructure.

Major Hospital Embraces RBAC

Major Hospital Embraces Role Based Access Control

A large mid-western hospital group had grown by acquisition and integration of new facilities. The resulting complex structure of hospitals, medical schools, and clinics has created a difficult environment for managing identities and access to critical clinical systems. Requesting and fulfilling access requests for critical roles is time-consuming manual work. Role Based Access Control (RBAC) offered a framework to improve user access management efficiency and effectiveness.

Get Your FREE Book

"RE-IMAGINING IDENTITY MANAGEMENT IN THE DIGITAL WORLD"

by Hanno Ekdahl

This book is filled with insightful content, backed by years of experience, to help guide you in designing, choosing, and implementing the right IAM solution for your business.

Watch The Idenhaus Video Series On YouTube

Download Our Latest Infographic

8 Benefits of an Identity & Access Management Roadmap

Creating an Identity & Access Management (IAM) roadmap is an important first step in helping your organization reap the full benefits of its IAM investment, as well as driving organizational understanding and support. Learn more in this free infographic!

8-benefits-IAM-Roadmap

Subscribe to our IAM Security Bulletin



Scroll to Top