article thumbnail

Leadership in Cybersecurity

N2Growth Blog

Regardless of titles or functional position, the lead role in a security organization is expected to wear many hats and solve a myriad of strategic, operational and tactical problems. Identity & Access Management (IAM). Policy & controls development with implementation. IT Security, V.P., Network systems security.

IAM 194
article thumbnail

You, Too, Can Move Your Company Into the Cloud

Harvard Business Review

Identity Access Management (IAM) vendors have been forced to consider brokering authentication for Active Directory because companies feel like they must stay on it as an internal authentication platform. The last bit of wisdom is to develop the most thorough 1-, 3- and 5-year cloud strategy that you can put down.

article thumbnail

Why the U.S. Needs More Worker-Owned Companies

Harvard Business Review

And companion bills developed to enable the U.S. On their own merits, worker-owned businesses can show policy makers, investors, managers, and advisers that companies with democratic ownership values and structures are operated with the same profit motivation as other companies. Already, U.S.

ESOP 13