article thumbnail

Leadership in Cybersecurity

N2Growth Blog

Below is a list of security initiatives that a security leader would either manage or have parallel impact upon within a business: Data security. Vendor management. Identity & Access Management (IAM). Vulnerability Management (VM). Managing enterprise risk tolerance. Audit management & support.

IAM 250
article thumbnail

You, Too, Can Move Your Company Into the Cloud

Harvard Business Review

Identity Access Management (IAM) vendors have been forced to consider brokering authentication for Active Directory because companies feel like they must stay on it as an internal authentication platform. IT management Information & technology' Reinventing Corporate IT An HBR Insight Center. The CIO In Crisis: What You Told Us.

article thumbnail

Why the U.S. Needs More Worker-Owned Companies

Harvard Business Review

nonprofit organizations like the Heartland Capital Strategy Institute are bringing together institutional investors, private asset managers, and worker representatives to harness some of the $13 trillion of assets in workers’ pension funds to invest in worker-friendly businesses that offer good investment returns. Already, U.S.

ESOP 12