This blog was originally published by 909Cyber here. Between 2017 and 2022 I was fortunate to be the leader responsible for the strategy and execution of Zero Trust initiatives at Adobe and Cisco. In my role of running enterprise Security for both companies (of course not at the same time). As the executive leading…
Archives
-
Mastering Financial Services Compliance With IAM and PAM
This blog was originally published by Bravura here. Managing data access is an ongoing journey for businesses in the financial services industry. Policies such as the Sarbanes-Oxley (SOX) Act and the Gramm-Leach-Bliley Act (GLBA) establish regulations that your business must follow when implementing any identity access management (IAM) or privileged access management (PAM) tool. Auditors will check your system for compliance…
-
BeIdentitySmart, BeCyberSmart for Security Practitioners
The phrase “a dog is for life, not just for Christmas” was coined by British animal welfare charity Dogs Trust over 40 years ago and still rings true to this day. The same theory must also be applied to securing digital identities in our increasingly turbulent modern business world. It’s all well and good having…
-
Connecting the Dots Between Cybersecurity and Managing Identity
The use of video doorbells and internal and external video cameras for home security has skyrocketed in recent years as homeowners seek new ways to protect themselves and their property. While these devices may capture images of potential intruders, they cannot confirm their identities. Is this really an employee from your electric company or is…