Mike Small of ISACA explains the approach of good governance in its role as a binding factor in controlling access and managing identity.
Over the past decade, there has been a tsunami of identity and access management technology. However, many organizations have not realised the benefits because they have taken a technology-led approach rather than one based on governance.
The need to identify users, control what they can access and audit their activities is fundamental to information security. Over the past decade, there has been a tsunami of identity and access management technology designed to provide a solution to these needs. However, many organizations have not realised the benefits expected from the application of this technology, because they have taken a technology-led approach rather than one based on governance. In addition, the move to outsourcing and the cloud means that technology and some processes are no longer under direct control. Read here more of the Mike Small of ISACA explains…