5 Must-Read Identity Access Management Articles, February 2018

February 21, 2018

Did you miss yesterday's newsletter?

Stay informed with the Idenhaus biweekly Identity Management & Cybersecurity digest. We curate the best IAM, IGA, IDM, IoT, & infosec articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here.

Here are our favorite Access Management & Cybersecurity articles for February 2018.

CISOs: What you can control – and what you can’t – in GDPR via CSO

The biggest misconception about GDPR is whether you can control data under the regulation – and whether you should. In fact, 80% of GDPR is out of the CISO’s control.

Cybersecurity 2018: Three Issues to Address  via DataCenter Journal

Given the volume and variety of threats in today’s network, IT security teams are often hard-pressed to determine priorities.

Highlights from Sailpoint’s Sales & Partner Kickoff #SailPointSKO18 via Idenhaus

We recently attended the Sailpoint partner conference (#SailPointSKO18) in Dallas, TX and, as sales and technical training events go, it was very worthwhile.

NIST presents overview of international cybersecurity IoT standards  via OpenGov

The Report identifies possible gaps in standards; for example, the application of blockchain in cryptographic techniques, the inability to use software patches to fix flaws in cyber incident management.

Align IT and Business with an Identity Management Solution Scorecard via Idenhaus

To successfully drive product selection and deliver the full value of an Identity Management solution, we recommend developing a decision framework, or scorecard, that combines investments in people and IT capabilities.



Also, be sure to download my new, FREE digital book entitled How To Design, Choose And Implement The Right IAM Solution For Your Business.

Follow @Idenhaus on Twitter and subscribe to our biweekly newsletter.

By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

More News