The Good, The Bad, The Agile

The-Good-The-Bad-The-Agile

The Good, The Bad, and The Agile Agile methodologies have become increasingly popular as businesses have sought to develop software more quickly and efficiently. Agile methods are based on iterative development, where software is developed in small increments and delivered on shorter timeframes. These development cycles, called Sprints, allow greater flexibility and responsiveness to changing […]

The Importance of Multiple IT Environments

By Richard Hawes Very early in my IT career, I learned that, as a matter of general best practice, companies almost always have at least two environments for critical systems and usually three for application development and management. Some companies, depending on their complexity and needs, have more than that. This is to enable the […]

Defining Waterfall vs. Agile vs. Hybrid Sprinting Project Management Methodology

Defining Waterfall vs. Agile vs. Hybrid Sprinting Project Management Methodology By Kimber Householder A project management methodology is a set of guidelines and procedures that will help project managers organize projects for maximum effectiveness. Fundamentally, it’s a structure or checklist to follow that aids in effectively managing the project process. Project management (PM) is crucial […]

Risk Analysis & Mitigation: Part 2

In Part 1, we covered Identifying and Categorizing risks.  After identifying what could happen to derail your project, what next? Spending the time to analyze and mitigate risk before undertaking a project can save you heartache, worry, and money in the long run.  We all inherently identify and analyze risks at different levels of detail.   […]

How To Analyze Risks To Mitigate Risks: Part 1

Risk Analysis & Mitigation: Part 1 By Kimber Householder All projects have risks.  Understanding the risks and how to avoid / recover from them are key to successful project management. Spending the time to analyze and mitigate risk before undertaking a project can save you heartache, worry, and money in the long run.  We all […]

Stay Ahead of Hackers with User Access Reviews – Part 1

Stay Ahead of Hackers with User Access Reviews – Part 1

It is impossible for businesses to stay ahead of every cyber threat; yet, organizations need to take some measures to protect themselves. While cyber-attacks may be inevitable, thoughtful preparation is an essential activity that sets resilient organizations apart from their peers in managing risk, minimizing damage, and recovering quickly. What is the best way to […]

5 Benefits of an IAM Strategy

5 Benefits of an IAM Strategy

Learn how a robust IAM Strategy can lower the risk of project failure.  Over the past 12 months, organizations have been forced to move a significant portion of their workforce to remote working arrangements. This has made a strong Identity and Access Management (IAM) system has become imperative.  A correctly implemented IAM strategy puts identity […]

5 Benefits of IAM Roadmaps

IAM Roadmaps

Learn how IAM Roadmaps ensure your Identity Management project is successful, the first time around. Technology is changing at an accelerating pace. Traditional approaches to strategic IT planning are no longer sufficient for organizations to be successful. Strategic plans determine the overall direction of a program and establish its principle goals; however, these plans rarely […]

Mastering Identity Management: Is HR Creating a Hostile Work Environment?

HR Rebellion

Identity and Access Management (IAM) is a unique IT solution because of its far-reaching scope. IAM touches everyone and everything in an organization.  Its reach extends from HR processes to the physical and system access of each individual. Once IAM goes live, the entire employee lifecycle is driven by the HR team and how they […]

Systems Thinking and Organization Modus Operandi

systems thinking

Stop optimizing the parts instead of the whole. Learn how to apply Systems Thinking to your Identity Management strategy.   As organizations grow, they eventually cross a threshold where they can no longer afford to manually administer and manage user access; at this point, they must find a way to automate routine user administration tasks. […]