Blog Posts Tagged with "Identity and Access Management"

5ad5c9808e863169a36cd3b7c535d72b

Convenience vs. Control: Achieving the Right Security Balance

May 12, 2017 Added by:Kevin Cunningham

By embedding identity governance policy and controls throughout all IAM processes, organizations can achieve a healthy, sustainable balance between convenience and control.

Comments  (0)

1488d8c03dfd3125db25b6aec94dcf92

Brand Damage Through Information Access

June 20, 2013 Added by:Eric Chiu

In a competitive business environment, reputation is a critical differentiator. Any company that suffers from a major data breach, instigated by an employee with a small grudge and big access, could face devastating consequences to the corporate brand, and to the bottom line.

Comments  (0)

942a200514c2a9d79858ce6355c40614

The Five-Step Privilege Management Checklist for Financial Organizations

March 27, 2013 Added by:Paul Kenyon

Financial institutions sit at the top end of the scale for security and reputational risk, with their databases of customer information making them especially vulnerable to criminal interception and subject to regulatory obligations.

Comments  (0)

65c1700fde3e9a94cc060a7e3777287c

Identity in the Modern Enterprise

March 12, 2013 Added by:Simon Moffatt

The view of IAM 1.0 (enterprise provisioning) and IAM 2.0 (federated identity, 'cloud' services and so) is continually evolving and it's pretty clear that identity management now has a greater role to play for many organisations, as they look to embrace things like increased mobility and out sourced service driven applications.

Comments  (0)

65c1700fde3e9a94cc060a7e3777287c

The Blurring of the Business Identity

February 26, 2013 Added by:Simon Moffatt

The concept of a well defined business identity is blurring and this is causing a complex reaction in the area of identity and access management. Internal, enterprise class identity and access management (IAM) has been long defined, as the managing of user access as defined by approval workflows, authoritative source integration and well defined system connectivity.

Comments  (0)

B09c361cbdc6cf629affdc7db30a186d

Security Metrics and the Balanced Scorecard

October 13, 2011 Added by:Steven Fox, CISSP, QSA

The business process metric ensures processes are meeting business requirements. The security team can use this information to identify where threats may have the greatest impact, to identify risks that are relevant, and to plan controls from the perspective of an attacker...

Comments  (0)