Leadership in Cybersecurity

N2Growth Blog

Identity & Access Management (IAM). Today’s information security leaders are faced with: Technology aligned reporting structure. Security leaders are primarily reporting to the CIO. Security initiatives viewed primarily as technology solutions create misalignment with business requirements. Invests in security technologies that supports business objectives. Has a business and technology background and thinks as a strategic “holistic” thinker.

IAM 175

You, Too, Can Move Your Company Into the Cloud

Harvard Business Review

Identity Access Management (IAM) vendors have been forced to consider brokering authentication for Active Directory because companies feel like they must stay on it as an internal authentication platform. It''s no small task, but you can move your company into the cloud if you approach things with a new mind and put aside the technologies of the past. The CIO In Crisis: What You Told Us. The Metamorphosis of the CIO. IT management Information & technology

IAM 12