Identity Management Blog

How Can Machine Learning and Identity Management Contribute to your Cyber Security Program?
Read More
The Gartner Hype Cycle while a bit of an oversimplification, is a great tool to understand the evolution of a product or solution space. Gartner describes the hype cycle by placing "visibility" on the "y" axis and "time" on the "x" axis. Visibility of the solution space is greatest early on during the "Peak of Inflated Expectations". The identity space’s inflated expectations and unfulfilled ...
Another Gartner IAM Summit has come and gone and the theme of 2017's conference really followed (and confirmed) what I saw at RSA Conference and the Identiverse (aka Cloud Identity Summit) earlier in the year: It's time to start considering adding intelligence capabilities to your IAM tools, services, and programs.
Building consensus for your IAM program and turning it into an enterprisewide initiative is critical to its success. Our team recently had an onsite meeting with the CIO, CSO, CTO and ten or so other key players to review our joint progress on their IAM implementation. We reported that we were on task and under budget but that we had identified a significant risk to the project. The risk we were ...
I will be honest, the idea for this blog entry came to me as I made a private observation while in a meeting with a client. The scene, a typical office conference room. Seven people huddled around the table discussing the intricacies of building enterprise grade IAM capabilities. All seven of us tapping away on our laptops taking various notes and collaborating with people over a web conference. ...
According to the Protenus Breach Barometer midyear report, 233 healthcare data breaches have occurred in 2017 so far, with over 3 million patient records compromised. Although the primary culprits are external hacking and ransomware, an alarming 41% was the result of insiders (both from error and intentional wrongdoing). This indicates a continued and pressing need for healthcare organizations to ...
Identity and Access Management (IAM) is hard and you shouldn’t have to go it alone. To be successful, you need the backing of the organization from all levels. One of the biggest pitfalls to avoid is the loss of momentum and support for a program. It’s a real risk and can create significant challenges as IAM is a long haul item. It lasts years and is never truly “done.” A good IAM program manager ...
This month, we wanted to highlight our Practice Director, Wayne Cissell. Wayne has extensive knowledge on all things Identity and Access Management (IAM), operations and the development and delivery of solutions and software products.  He has over 20 years of experience in IT, professional services and the software industry.