The Hub

Gartner’s yearly identity and access management (IAM) Summit concluded yesterday and it was, like usual, a well-run affair. 1,500 IAM professionals from all over the world converged in Las Vegas to learn from each other and share IAM war stories. For 2016, IAM investment remains strong as more organizations take steps to mitigate risk and drive efficiencies. They should, as we continue to see that the bad guys are finding their way into places they should not be. I noticed a focus on taking steps to improve the privileged access management (PAM) service capabilities as these tend to be the ...
Read More
Identity and access management (IAM) is a lot of work. A lot of work to get off the ground and a lot of work to keep it going. One of the concerns that I hear often when advising customers revolves around how much effort it is going to take to get their IAM program into a more mature state.  The answer tends to be a lot.
I am currently sitting in the United Club at O’Hare Airport on a relatively busy Tuesday morning. There is the usual smattering of hurried travelers milling around.   Among those are the busy professionals with their laptops out, earpieces in, and working on all sorts of tasks.   To my left, is a gentleman working on a presentation detailing the key sales figures for a major national retailer.
As we enter the age of biometric security, previously impossible feats are now child’s play. Security measures began with a passcode, then progressed to a fingerprint scanner, and, most recently, an iris scanner on the Galaxy Note 7. All of these efforts were to thwart both hackers and attackers from accessing sensitive business information and data. A recent roll-out by Mastercard has shown next ...
Securing customer information is of the utmost importance. Knowing everything that goes into implementing an IAM program is a quintessential part of starting one. In the case for this customer, handling sensitive client data needed to be more automated to secure the environment.
The other day I went to visit a prospect who was evaluating vendors for a digital transformation project. The person heading up the project was a Senior Program Manager. She was clearly very capable – one of those people who are change agents within an organization. As soon as I walked in I could tell that she had rolled up her sleeves and was on a mission to accomplish great things. I was ...
“Gartner defines unstructured data as content that does not conform to a specific, pre-defined data model. It tends to be the human-generated and people-oriented content that does not fit neatly into database tables.” -Darin Stewart, Gartner When discussing the healthcare landscape, you can scarcely get past the handshake before the looming elephant of unstructured data enters the room. This ...
More bad news this week coming out of the SWIFT messaging system hacks. New banks are being targeted and an unspecified number have experienced incidents. In the case of the $81 million dollar Bangladesh Bank breach, the intrusion started with a vulnerable network switch. The bank used “second-hand networking gear” which led to the compromise. Second-hand anything in your security and networking ...
Last week, I wrote a blog post about how biometric authentication on a mobile device had "leveled up" by way of the iris scanner on the new Samsung Galaxy Note 7 smartphone. I spent this last weekend trying it out first hand and here is what I experienced. Does it work? Yes, BUT... To activate it, you have to press the power button, then you have to swipe the screen to turn on the scanner. You ...
What comes to mind when I picture an Olympic athlete? Commitment Conditioning Repetition An Olympian is committed to their specialty, continually conditioning their mind and body to optimize performance, and repeating their actions again and again to achieve as close to perfection as possible. I liken this with preparing for an IAM implementation.