The Hub

Photo Credit The 2017 Cloud Identity Summit has just concluded. This year, the conference was in my hometown of Chicago where more than 1400 people representing over a thousand companies congregated to talk, learn, and share what is going on with identity across all spectrums. This was my second year attending. I feel this is one of the better IAM conferences and is worth attending if you are responsible for leading, building, or running an IAM program. Many great topics from over 200 speakers were covered over four full days. Here are the ones that resonated with me.
Read More
Granting access to a user is an exercise in trust. This is why information security best practices preach following the principle of “least privilege” to mitigate the risk of trusting a user. But even when we give a user exactly and only the right privileges to do their jobs, we are still trusting them with those privileges and expecting them to use them for the right things. An important part of ...
As technology becomes increasingly important to corporate success, so does the value of managing access to resources. Creating effective and intuitive IAM services that make it easy for the business to obtain the required access in a safe and secure manner can minimize the complexities associated with IAM.
For the month of May, we would like to highlight fellow Identropian, Diane Spinelli.  Diane’s current role is Client Partner & Group Manager, which is critical to help bridge the gap between client and company, ensuring that the project for the client’s IAM program is a success.  Not always an easy feat!
I’m on the road again, sitting in a club lounge at O’Hare airport. It’s another typical Tuesday late morning with a decent number of people busy typing (or in some case hunting and pecking) through emails. With that setting here is a recap of a scenario that has just played out just a few feet from me:
Covering financial services firms operating in the State of the New York, the new Cybersecurity Regulation has an extensive set of requirements aimed at improving data protection and access management. Identity and Access Management (IAM) will play a pivotal role in meeting compliance and the Regulation’s broader intent. In effect since March 1, 2017 and in the process of being phased in over the ...
This month, we wanted to highlight our resident “Problem Solver Extraordinaire,” David Redmond. Dave is truly a jack-of-all-trades, dividing his time across many different areas of our business—giving product demonstrations, leading Proofs of Concepts (POCs), writing and reviewing Statements of Work, contributing to advisory services and professional services engagements, training staff and more! ...
One of Identropy's most popular blog posts is our "Top 10 Common Pitfalls of an IAM Initiative." It's hard to believe, but that article was written seven years ago and still is chock full of relevant and accurate information. That being said, seven years is a long time and we felt it was necessary to take a look at the list, review it, and make some updates to move it forward to the world of IAM ...
Personal story time: I went to my usual place to get a haircut recently and there was a new stylist. I explained what I wanted and she started to go to work. Right away, I could tell she was nervous, maybe even new, and I was getting that "something's not right" feeling. A few minutes went by and I could tell she was struggling with the cut. Now there isn't anything specifically difficult about ...
Being an Identity and Access Management consultant is cool. I get to work with clients big and small across various industries. I run into new challenges each time and I love developing innovative approaches to solving these challenges. But as fun as it is to innovate, there are certain undeniable truths in IAM that provide the foundation for good advice.