Addressing Identity Risk Factors in the Age of “Need It Now”
In today’s digital world, boundaries are blurring. Driven by “need it now” business demands, cloud applications are surfacing in business environments everywhere, often with little or no IT involvement. We’re allowing access to a growing and dynamic user population that includes not only employees but business partners, customers, channel partners and contractors. And, while the always-on mobile and BYOD landscape offers much-needed convenience for users, it further blurs personal and corporate access boundaries. Ultimately, we need to find a way to embrace today’s boundaryless business world, while maintaining security confidence, ensuring that we meet increasing compliance demands, and doing so in a way that’s completely seamless and easy for our users.
Is this mission impossible? One might think so, especially as the business and IT landscapes continue to evolve, unleashing a proliferation of access points, applications and islands of identity. IT has less and less centralized control and visibility and the bad guys have more opportunities to gain unauthorized access through those access blind spots of ours.
Only by effectively getting a grasp on our identity risks can we gain a sense of identity and access assurance. But, what are those risks and how do we get ahead of them to mitigate the risks of any breaches, audit failures and business slowdowns?
Here are 5 questions to consider:
- How sure are you that your users are who they say they are?
- Do you understand where your “crown jewels” are?
- Where are your privileged identities and how are you managing them?
- Do you have unified approach across all applications and services to increase visibility?
- How compliant are you with respect to high-risk applications?
Answering these questions with confidence is key to accomplishing your mission. In my session at this year’s Cloud Identity Summit, I’ll share some key strategies that can help you overcome the challenges associated with managing access and identity risk. And, of course, come meet the identity team in the RSA barista booth, grab a cup of joe, and learn how to identify identity risk factors so you can focus on what matters most and mitigate your greatest identity risks before they can do harm.
Finally, don’t miss the May 23rd webinar Intelligent Identity for the Enterprise: Trends, Topics & Cloud Identity Summit Preview in which I will be part of a panel of identity experts will discuss considerations for a future-proof and intelligent IAM infrastructure:
- Patrick Harding, CTO, Ping Identity
- Alex Simons, Partner Director of Program Management, Identity Division, Microsoft
- Richard Bird, Executive Director, Office of the CISO, Optiv
- Jim Ducharme, VP of Identity Products, RSA
- Brian Bell, CMO, Ping Identity (Moderator)
Topics will include, but are not be limited to: modern authentication solutions for customer, partner and consumer IAM, optimizing your path for legacy IAM modernization, why standards matter, and why CISOs should demand both user convenience and security.
By Jim Ducharme, VP of Identity Products, RSAView More Posts