Posts by Beyond Best Practices TWG

  1. IAM Best Practices Blog Series: It All Starts with Identity Ownership

    As protecting identities takes center stage in the battle to stay secure, a common question being asked of identity and security professionals at every level is “who owns identity in your organization?”  Some will argue that there isn’t a right answer, as long as someone owns the overall administration and security of identities, especially organizations…

  2. IAM Best Practices Blog Series: Access Governance Not Working Well? Here’s How to Fix It

    One of the biggest impediments to effective identity governance begins at the planning stage with determining who owns the identity function in the business. In an Identity Defined Security Alliance (IDSA) survey of non-IT stakeholders who play a part in the identity workflow and security considerations, it was discovered that many departments within a business owned a…

  3. Identity Management Day: What Sharks and Your Identity Program Have in Common

    Legend has it that in 1988 the idea for Shark Week was hatched over a round of drinks and documented on the back of a napkin as an awesome (and fun) way to capture more viewers. Seems like it worked: Discovery Channel viewers doubled after the very first Shark Week. Fast forward to 2021, and…

  4. Avoid the 4 Identity Program Booby Traps

    Sometimes the hardest part of a journey can be its first step. As organizations try to keep up with the demands of digital transformation and cloud adoption, starting an identity program can be a daunting process. Between customers, employees, and non-human identities such as systems and applications, there is a lot to think about—and a…

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.