Identity Management Blog

According to the Protenus Breach Barometer midyear report, 233 healthcare data breaches have occurred in 2017 so far, with over 3 million patient records compromised. Although the primary culprits are external hacking and ransomware, an alarming 41% was the result of insiders (both from error and intentional wrongdoing). This indicates a continued and pressing need for healthcare organizations to implement data governance in order to protect patients’ information from attack.
Read More
Identity and Access Management (IAM) is hard and you shouldn’t have to go it alone. To be successful, you need the backing of the organization from all levels. One of the biggest pitfalls to avoid is the loss of momentum and support for a program. It’s a real risk and can create significant challenges as IAM is a long haul item. It lasts years and is never truly “done.” A good IAM program manager ...
This month, we wanted to highlight our Practice Director, Wayne Cissell. Wayne has extensive knowledge on all things Identity and Access Management (IAM), operations and the development and delivery of solutions and software products.  He has over 20 years of experience in IT, professional services and the software industry.
Cybercrime continues to increase unabated and at a torrid pace. In 2016, according to the Ponemon Institute, the estimated average cost of a data breach for an organization was $4 million dollars. And that cost increases the longer it takes the organization to detect and contain the breach. It also has an increasingly negative effect to the organization’s reputation. At this point, a breach is ...
I have returned from a frantic, exciting, and exhausting three days in Las Vegas to attend the yearly Black Hat conference. It’s a great event with a lot of attendees, sponsors, vendors, and quality content and this year marked the 20th year for Black Hat. While the conference is not specifically about Identity & Access Management (IAM), you can’t escape the fact that identity is everywhere and ...
This month, we’re happy to highlight SailPoint Engineer, Elaine Van Horn.  Elaine came to Identropy in early 2016 after many years in IT.  Originally, she was in the casino gaming world until she moved into finance and banking.   She’s worked with a number of systems and platforms as a programmer and analyst. She began working with the SailPoint products in 2010 and hasn’t looked back since. ...
The Identropy Advisory team recently came together and presented to a group of CISOs in Upstate New York. The topic: The High Cost of Not Doing IAM Right. As part of that discussion, we talked about how failing at Identity and Access Management (IAM) can lead to an increase not only in the number of breaches, but the costs associated with remediating them. While good IAM is hard, failing at it ...
  Are you getting your arms around how to scale your Identity and Access Management (IAM) platform to your end-customers? In the past we've discussed the distinction between Enterprise IAM and CIAM. Today we're going to take a deeper dive into CIAM and explore how that space is further sub-divided in some pretty important ways.  If you’re in any outward facing business, which you probably are, ...
If you’re a customer of ours, most likely you’ve worked with Chad Wolcott. Chad is Identropy’s Practice Director and is our Staff Spotlight for June. For the past decade, Chad has worked closely with clients across the globe helping them navigate the dangerous waters of Identity and Access Management (IAM). Prior to joining Identropy, he was the VP of Global Services for Courion Corporation where ...
Photo Credit The 2017 Cloud Identity Summit has just concluded. This year, the conference was in my hometown of Chicago where more than 1400 people representing over a thousand companies congregated to talk, learn, and share what is going on with identity across all spectrums. This was my second year attending. I feel this is one of the better IAM conferences and is worth attending if you are ...