article thumbnail

Leadership in Cybersecurity

N2Growth Blog

Identity & Access Management (IAM). Policy & controls development with implementation. Security leaders are primarily reporting to the CIO. Network systems security. Disaster Recovery (DR). Application security. Vulnerability Management (VM). Data storage. Business Continuity (BC). Managing enterprise risk tolerance.

IAM 209
article thumbnail

You, Too, Can Move Your Company Into the Cloud

Harvard Business Review

Identity Access Management (IAM) vendors have been forced to consider brokering authentication for Active Directory because companies feel like they must stay on it as an internal authentication platform. The last bit of wisdom is to develop the most thorough 1-, 3- and 5-year cloud strategy that you can put down.