8 Must-Read Articles on Identity Governance & Access Management

January 30, 2019
Identity Governance and Access Management

Identity Governance Access Management

Thanks for reading our biweekly digest of Identity Governance, Cybersecurity, and Access Management articles. We curate a diverse selection of IdM, IGA, privacy, and cybersecurity articles to help you navigate the rapidly-changing IT security landscape. Subscribe to our biweekly newsletter here.

This week's news digest includes 8 informative identity governance and access management articles from late January 2019. Enjoy!


2018 Gartner IAM Highlights: Looking Back at Looking Forward via Idenhaus

Now that we’ve had the opportunity to reflect on the conference as a whole, I want to highlight several themes that headlined #GartnerIAM 2018.

Top Security and Privacy TED Talks from 2018 via CSO

IoT security, insecure software, and data privacy among the top security and privacy TED talks from 2018.

The Machine Behind Identity Governance via Forbes

Enterprise organizations of all sizes rely on identity governance to enforce strict policies that protect data from unwanted access. With the advent of identity and artificial intelligence (AI), it’s now easier to find the needles you didn’t even know you had in your haystack.

Aligning to the NIST Cybersecurity Framework in the AWS Cloud   via AWS

The updated guide is designed to help commercial and public sector entities of any size and in any part of the world align with the CSF by leveraging AWS services and resources.

The Ultimate Beginners Guide to GDPR Compliance in 2019  via VPNGeeks

Whether you’re an individual, organisation or company, you may be branded as a ‘controller’ or ‘processor’ of personal data. Check out this primer on GDPR for small business.

The 5 Trademarks of Agile Organizations via McKinsey

Research shows that agile organizations have a 70% chance of being in the top quartile of organizational health, the best indicator of long-term performance.

Managing Identity and Access Management in Uncertain Times via CSO

Emerging standards and frameworks such as Gartner CARTA, Zero Trust, NIST SP 800 and IDSA provide guidelines, but how organizations manage identity and access management in 2019 is what matters most.

Align IT and Business with an Identity Management Solution Scorecard  via Idenhaus

Many organizations deploy Identity & Access Management (IAM) solutions based on surprisingly vague, simplistic, and unrealistic business cases that do not do justice to the multi-million dollar investments they require.


Check out our previous digest of Identity & Access Management articles here: 9 Insightful Cybersecurity & Access Management Articles, January 2019


An IAM Assessment is a quick, expert evaluation of your environment that identifies and addresses the most common issues organizations face when implementing a solution.

This is ideal for organizations that:

  • Are struggling to get their IAM solutions deployed
  • Have a misalignment between their processes and technology
  • Have an immature IAM solution with too many workarounds
  • Companies that want to accelerate their IAM programs

Click here to learn more about the IAM Assessment.


Follow @Idenhaus on Twitter and subscribe to our biweekly newsletter.

By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

More News