Identity management to-do list aligns with cybersecurity

Read why Jon Oltsik says that identity management and cyber security are intertwined on CSO Online :

My colleague Mark Bowker just completed some comprehensive research on identity and access management (IAM) challenges, plans and strategies at enterprise organizations. As a cybersecurity professional, I welcome this data. Identity management should be a major component of an enterprise risk management strategy, yet IAM technology decisions are often treated tactically or left to application developers or IT operations staff who don’t always prioritize security in their planning.

Read his full article here.

Track the strategic threats to your business with the Threat Brief, delivered to your email daily.

Subscribe Here