Hanno Ekdahl

9 Top Articles on Cybersecurity & Identity Management

Top Stories on Digital Identity Management, ICS Attacks, and the Dangerous Data Your Smartphone Leaks. Every two weeks we release a curated digest of the most interesting and informative articles covering IAM, Cybersecurity, Governance, ICS/SCADA, compliance, privacy, and more across a range of industries. If you would prefer to receive this via email (and a […]

9 Top Articles on Cybersecurity & Identity Management Read More »

Why Standards are the Secret Sauce to IAM

“Standardization is the necessary foundation for improvement.” – Henry Ford Henry Ford is credited with revolutionizing manufacturing – dramatically increasing productivity and reducing errors/waste in the process. How did he accomplish this modern miracle of manufacturing? The secret sauce was standardization! By using interchangeable parts required to make the individual pieces of the car, each

Why Standards are the Secret Sauce to IAM Read More »

Mastering Identity Management: When Your HRIS System Falls Short

Identity Management (IAM) is built around the concept of establishing a “Gold Standard” data set for each user that is: 1) accurate, 2) actively maintained, and 3) available. In IAM, answering the question “Who are you?” depends on having access to the most current information for each user (employee or contractor) on the network. Usually,

Mastering Identity Management: When Your HRIS System Falls Short Read More »

Mastering Identity Management: A Better Process for Vendor Evaluation

Selecting a vendor for your Identity Management solution can be an overwhelming task. The market is crowded, product functionality covers a wide range of features, and the investment in both money and time is guaranteed to lock in the business for 2-3 years. If the chosen product comes up short in a key area, the

Mastering Identity Management: A Better Process for Vendor Evaluation Read More »

Does your Identity Management Program Pass the ‘Marshmallow Test’?

There is a famous series of studies about self-discipline called the ‘Marshmallow Test’ that was run by Stanford University in the 60s and 70s. During these studies, children were offered a choice between getting a single marshmallow immediately or getting a whole bag of marshmallows if they waited for a short period, during which the

Does your Identity Management Program Pass the ‘Marshmallow Test’? Read More »

Getting Started with Data Loss Prevention: 4 Best Practices

Client A implemented DLP blocking early in the project and blocked several key business transactions. They had not defined a process to review and resolve false positives quickly, and once the business users became unhappy it led to the removal of the DLP solution. Organizations have had a tumultuous relationship with Data Loss Prevention solutions

Getting Started with Data Loss Prevention: 4 Best Practices Read More »

10 Challenges IAM Governance Teams Help Organizations Overcome

The best Identity Management (IAM) practitioners are businesses that have adopted a formal governance structure with defined processes and practices that deliver value. Governance frameworks are necessary to deliver on the promise of IAM to support business users’ access needs consistently without compromising security or causing a compliance breach. The big pivot here is that Identity Management

10 Challenges IAM Governance Teams Help Organizations Overcome Read More »

Scroll to Top