5 Things every Board Member Should Know about Identity and Access Management
Cloud data storage, multiple business applications, BYOD, home office – Applying appropriate and sufficient controls for managing user accounts and access rights address one of the most significant challenges in today’s enterprise’s IT environment. Intentional or accidental misuse of IT driven business processes by (formerly) authorized users may have a severe impact on the enterprise and its competitive position. As we have pointed out before on this blog, insiders continue to be a major source of data breaches. The following two examples illustrate an organization’s risk arising from a lack of Identity and Access Management (IAM).
Read more at – 5 Things every Board Member Should Know about Identity and Access Management