The role of identity and access management is as critical as ever. But the demands of the role? They are radically different, says Sam Curry, CTO of RSA, who discusses the new skills needed.
IAM has never been an easy task for information security professionals. And it has only grown more complex as the enterprise, end-users and even critical data have extended beyond the security pro’s immediate control. “You went from owning both where your apps and data are stored and how people accessed it to owning nothing, and from a distance having to apply IT policies and, by default, security policies as well,” says Curry, chief technologist for RSA, the security division of EMC. Evolving Role of ID, Access Management