article thumbnail

Leadership in Cybersecurity

N2Growth Blog

Identity & Access Management (IAM). Below is a list of security initiatives that a security leader would either manage or have parallel impact upon within a business: Data security. Vendor management. Budgeting & forecasting. Network systems security. Disaster Recovery (DR). Application security. Vulnerability Management (VM).

IAM 250
article thumbnail

Your Whole Company Needs to Be Distinctive, Not Just Your Product

Harvard Business Review

For example, Iams pet food was one of the first premium brands; it sold to health-conscious pet owners, who purchased it only at specialized pet stores. When Procter & Gamble purchased it in 1999 for $2.3

IAM 11
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

You, Too, Can Move Your Company Into the Cloud

Harvard Business Review

Identity Access Management (IAM) vendors have been forced to consider brokering authentication for Active Directory because companies feel like they must stay on it as an internal authentication platform. Nothing could be further from the truth and if you do your research, you will discover that there is a wealth of options out there.

article thumbnail

Why the U.S. Needs More Worker-Owned Companies

Harvard Business Review

Last year 400 members of IAM Maine Lobstering Union bought the wholesale operation of Trenton Bridge Lobster Pound and turned it into a worker-owned cooperative called Lobster 207. Worker buyouts are particularly likely to blossom in industries with organized workers who transition to union cooperatives.

ESOP 12