Identity Management Blog

I will be honest, the idea for this blog entry came to me as I made a private observation while in a meeting with a client. The scene, a typical office conference room. Seven people huddled around the table discussing the intricacies of building enterprise grade IAM capabilities. All seven of us tapping away on our laptops taking various notes and collaborating with people over a web conference. It was pretty average for a meeting, I would say. What struck me, though, were the laptops. Of the seven in the room, five were MacBooks. For the longest time, it was a Windows world, especially in ...
Read More
According to the Protenus Breach Barometer midyear report, 233 healthcare data breaches have occurred in 2017 so far, with over 3 million patient records compromised. Although the primary culprits are external hacking and ransomware, an alarming 41% was the result of insiders (both from error and intentional wrongdoing). This indicates a continued and pressing need for healthcare organizations to ...
Last week, I co-presented during the NJ-DV HIMSS (Healthcare Information and Management Systems Society) Fall Conference 2011 in Atlantic City, alongside my friend François Bodhuin, Technology Director at South Jersey Healthcare.
This blog post was originally published here. I recently worked on a project that reminded me of Jim Collins' book Good to Great: Why Some Companies Make the Leap... and Others Don't , particularly the part about getting the the right people "on the bus": First Who, Then What: Get the right people on the bus, then figure out where to go. Finding the right people and trying them out in different ...
In this final part of this 3-part article, we discuss some of the considerations that the CISO of a healthcare organization should take into account as their IAM program gets under way.
In part 1 of this 3-part article, we introduced the macro forces that are driving a shift towards efficiency in healthcare, and argued that these forces will have a direct effect on IAM. In part 2, we speculate on what specific consequences are in store for the coming years.
For some time now, we have been working with healthcare companies looking at rolling out an Identity and Access Management (IAM) infrastructure to address their most pressing access governance needs;.  Often, these deployments stem from a result of something bad happening or simply from a high degree of loudly voiced frustration from end users.  In the past year and a half this trend has gained ...
As we continue to evolve our advisory services offerings, namely our Kickstart program, we recognize that, in addition to helping clients figure out their Identity and Access Management (IAM) strategic roadmap, governance model, and implementation approach, our customers increasingly look to us for advice about best practices and practical advice on how they can improve the success of their IAM ...
Part 1 of this 3-part article defined access governance, and part 2 described some of the unique challenges poised by cloud applications.  In this last part, I provide some recommendations based on our experience bringing cloud applications under governance.