Idenhaus Biweekly: Access Management, GDPR Compliance, and Blockchain-Based IAM
Idenhaus Consulting Blog
by Hanno Ekdahl
5y ago
Thanks for reading the Idenhaus biweekly digest of insightful Access Management, GDPR compliance, & Cybersecurity articles. We curate a diverse selection of IAM, RBAC, and Identity Governance articles to help you navigate the rapidly-changing IT security landscape. Subscribe to our biweekly newsletter here. What You Need to Know About GDPR Compliance via Idenhaus Senior privacy consultant Jodi Daniels shares why consumer trust is a key business driver for General Data Protection Regulation (GDPR) compliance. Incident Response: 3 Easy Traps & How to Avoid Them via DarkReading Sage leg ..read more
Visit website
What You Need to Know About GDPR Compliance with Jodi Daniels
Idenhaus Consulting Blog
by Hanno Ekdahl
5y ago
Senior privacy consultant Jodi Daniels shares why consumer trust is a key business driver for General Data Protection Regulation (GDPR) compliance. Our GDPR Overview discusses how the General Data Protection Regulation affects all companies that collect user data from and/or do business with citizens in the European Union. While GDPR compliance is often evaluated in terms of its financial implications, the impact on consumer trust and brand value is also worth noting. Jodi’s latest review of GDPR addresses the importance of customer trust when it comes to compliance and explores the followin ..read more
Visit website
Idenhaus Biweekly: IAM Roadmap, M&A Due Diligence, and Upcoming Webinars
Idenhaus Consulting Blog
by Hanno Ekdahl
5y ago
Thanks for reading the Idenhaus biweekly digest of insightful Identity Management, data security, & Cybersecurity articles. We curate a diverse selection of IAM, RBAC, GDPR, and Identity Governance articles to help you navigate the rapidly-changing IT security landscape. Subscribe to our biweekly newsletter here. Why Your Organization Needs an IAM Roadmap via Idenhaus Did you know that over half of all Identity Management projects fail the first time? And, even when they are successful, 4 out of 5 executives say they are not happy with the value of their Identity Management program. Cybe ..read more
Visit website
Why Your Organization Needs an IAM Roadmap
Idenhaus Consulting Blog
by Hanno Ekdahl
5y ago
Hanno Ekdahl, founder of Idenhaus Consulting, provides an overview of why your organization needs an IAM Roadmap prior to kicking off any Identity Management project. Did you know that over half of all Identity Management projects fail the first time? And, even when they are successful, 4 out of 5 executives say they are not happy with the value of their Identity Management program. This often happens because Identity Management implementations are approached as a purely technological play instead of the transformative projects that they really are. In this video, we cover the following theme ..read more
Visit website
Idenhaus Biweekly: Application Shielding, Data Security, ForgeRock Recap
Idenhaus Consulting Blog
by Hanno Ekdahl
5y ago
Thanks for reading our biweekly roundup of insightful Identity Management, data security, & Cybersec articles. We curate a diverse selection of IAM, RBAC, GDPR, and Identity Governance articles to help you navigate the rapidly-changing IT security landscape. Subscribe to our biweekly newsletter here. ForgeRock IdentityLive Conference 2019: Balancing Data Security and User Experience via Idenhaus One of my favorite sessions was USAA’s “Journey with ForgeRock” case study. The discussion and started with the powerful statement that “trust is our brand” and requires striking a delicate balan ..read more
Visit website
ForgeRock IdentityLive Conference 2019: Balancing Security and User Experience
Idenhaus Consulting Blog
by Hanno Ekdahl
5y ago
I had the pleasure to attend the ForgeRock IdentityLive Conference in Nashville this week. I was able to learn more about ForgeRock’s technology and connect with some familiar faces from the Identity Management space. The conference was primarily organized around plenary sessions with a good mix of product updates from ForgeRock as well as customers sharing their implementation experiences. There was discussion around finding opportunities to make the sessions more interactive next year with smaller breakouts or discussion formats. One of my favorite sessions was USAA’s “Journey with ForgeRoc ..read more
Visit website
8 Insightful Identity Governance & GDPR Articles, April 2019
Idenhaus Consulting Blog
by Hanno Ekdahl
5y ago
Thanks for reading our biweekly roundup of insightful Identity Governance & Cybersecurity articles. We curate a diverse selection of IAM, GDPR, Role Based Access Control, and Identity Management articles to help you navigate the rapidly-changing IT security landscape. Subscribe to our biweekly newsletter here. GDPR Overview with Jodi Daniels, Privacy Consultant via Idenhaus GDPR is the most important change in data privacy in the past 20 years and fundamentally reshapes the way data is handled across every sector. Why Cyber Security is Key to Enterprise Risk Management for all Organizati ..read more
Visit website
GDPR Overview with Jodi Daniels, Privacy Consultant
Idenhaus Consulting Blog
by Hanno Ekdahl
5y ago
Privacy consultant Jodi Daniels provides an overview of the General Data Protection Regulation (GDPR). GDPR is the most important change in data privacy in the past 20 years and fundamentally reshapes the way data is handled across every sector. Jodi Daniels is the founder and CEO of Red Clover Advisors, a boutique data privacy consultancy, and serves on the Board of Idenhaus Consulting. In this video, she reviews the following themes: What is the General Data Protection Regulation? How does this affect companies in the United States? Are there minimum requirements for companies to participa ..read more
Visit website
6 Common Role Based Access Control (RBAC) Implementation Pitfalls
Idenhaus Consulting Blog
by Hanno Ekdahl
5y ago
Role based access control (RBAC) has been around for a long time, but that doesn’t mean it’s easy to implement. People prefer to talk about the benefits of this access control model, so today we are going to be contrarian and talk about six common RBAC implementation pitfalls. To learn more about this topic, you can access our 45-minute webinar on-demand: How to Effectively Use Role Based Access Control in the Real World. Here are the 6 Common RBAC Implementation Pitfalls: 1. RBAC Absolutism  This occurs when an organization tries to provision almost all user access through an RBAC model. Try ..read more
Visit website
7 Must-Read Identity Governance & Cybersecurity Articles, April 2019
Idenhaus Consulting Blog
by Hanno Ekdahl
5y ago
Thanks for reading our biweekly roundup of Identity Governance & Cybersecurity newsbites. We curate a diverse selection of IAM, IGA, Role Based Access Control, and Identity Management articles to help you navigate the rapidly-changing IT security landscape. Subscribe to our biweekly newsletter here. Why Organizations Need an RBAC Security Model via Idenhaus In this post, we discuss why organizations implement role based access control (RBAC) from an operational perspective. Why IoT Devices Are the Trojan Horses of Our Time. And Why Nobody Talks About It. via Paessler Even if the devices ..read more
Visit website

Follow Idenhaus Consulting Blog on FeedSpot

Continue with Google
Continue with Apple
OR