Identity Management Blog

Another Gartner IAM Summit has come and gone and the theme of 2017's conference really followed (and confirmed) what I saw at RSA Conference and the Identiverse (aka Cloud Identity Summit) earlier in the year: It's time to start considering adding intelligence capabilities to your IAM tools, services, and programs.
Read More
Building consensus for your IAM program and turning it into an enterprisewide initiative is critical to its success. Our team recently had an onsite meeting with the CIO, CSO, CTO and ten or so other key players to review our joint progress on their IAM implementation. We reported that we were on task and under budget but that we had identified a significant risk to the project. The risk we were ...
I will be honest, the idea for this blog entry came to me as I made a private observation while in a meeting with a client. The scene, a typical office conference room. Seven people huddled around the table discussing the intricacies of building enterprise grade IAM capabilities. All seven of us tapping away on our laptops taking various notes and collaborating with people over a web conference. ...
According to the Protenus Breach Barometer midyear report, 233 healthcare data breaches have occurred in 2017 so far, with over 3 million patient records compromised. Although the primary culprits are external hacking and ransomware, an alarming 41% was the result of insiders (both from error and intentional wrongdoing). This indicates a continued and pressing need for healthcare organizations to ...
Identity and Access Management (IAM) is hard and you shouldn’t have to go it alone. To be successful, you need the backing of the organization from all levels. One of the biggest pitfalls to avoid is the loss of momentum and support for a program. It’s a real risk and can create significant challenges as IAM is a long haul item. It lasts years and is never truly “done.” A good IAM program manager ...
This month, we wanted to highlight our Practice Director, Wayne Cissell. Wayne has extensive knowledge on all things Identity and Access Management (IAM), operations and the development and delivery of solutions and software products.  He has over 20 years of experience in IT, professional services and the software industry.
Cybercrime continues to increase unabated and at a torrid pace. In 2016, according to the Ponemon Institute, the estimated average cost of a data breach for an organization was $4 million dollars. And that cost increases the longer it takes the organization to detect and contain the breach. It also has an increasingly negative effect to the organization’s reputation. At this point, a breach is ...
I have returned from a frantic, exciting, and exhausting three days in Las Vegas to attend the yearly Black Hat conference. It’s a great event with a lot of attendees, sponsors, vendors, and quality content and this year marked the 20th year for Black Hat. While the conference is not specifically about Identity & Access Management (IAM), you can’t escape the fact that identity is everywhere and ...
This month, we’re happy to highlight SailPoint Engineer, Elaine Van Horn.  Elaine came to Identropy in early 2016 after many years in IT.  Originally, she was in the casino gaming world until she moved into finance and banking.   She’s worked with a number of systems and platforms as a programmer and analyst. She began working with the SailPoint products in 2010 and hasn’t looked back since. ...
The Identropy Advisory team recently came together and presented to a group of CISOs in Upstate New York. The topic: The High Cost of Not Doing IAM Right. As part of that discussion, we talked about how failing at Identity and Access Management (IAM) can lead to an increase not only in the number of breaches, but the costs associated with remediating them. While good IAM is hard, failing at it ...