You searched for identity management/ | SC Media

Your search for identity management/ returned 24 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last 2 years remove
Post remove
Doug Olenick remove

Your search for identity management/ returned 24 results

Sort Results:

Relevant Recent
Events, Security News

SC Media opens nominations for the 2020 SC Awards

SC Media is announcing a call for nominations for the 2020 SC Awards, which will be bestowed to the winners during a gala dinner celebration, to be held in February 2020 in San Francisco. The cybersecurity community is encouraged to submit nominations for its best and brightest companies, technologies and individuals in the following categories:…
Reboot Leadership Awards 2019

Roger Grimes – KnowBe4

Why Nominated: Roger Grimes is a 30-year computer security professional and prolific author frequently consults with the world’s largest and smallest companies and militaries. Profile: In his role as an advocate, Roger Grimes spreads his message on the importance of cybersecurity to the community at conferences such as RSA, Black Hat, Tech Mentor, Tech Ed, SecTOR, AusCERT…
Reboot Leadership Awards 2019

Kevin von Keyserling – Keyfactor

Why Nominated: Since founding his company in 2004, Kevin von Keyserling has transformed Keyfactor (formerly Certified Security Solutions) from a security consultancy to a digital identity management solutions provider that manages more than 500 million digital certificates for companies around the world. Over the last year, he closed the Cleveland, Ohio-area company’s largest funding round to…
Executive Insight, Opinion

A new way to think about security in autonomous systems: Don’t

The age of autonomy is upon us. While talk of autonomous cars in the not-too-distant future captures the imagination, the reality is that autonomous systems are very much with us in the present day. We see it in the robots that are packing parcels in an online retailer’s warehouse, or welding car parts on an…
Executive Insight, Opinion

5 Steps organizations should take to ensure CCPA compliance

Now that the California Consumer Privacy Act has officially taken effect, follow these 5 steps to ensure compliance, even if your organization is outside the Golden State. According to the Identity Theft Resource Center, more than 164 million consumer records containing personally identifiable information (PII) were exposed in data breaches in 2019. Seemingly every week…
Executive Insight, Opinion

Identity access management – An auditor’s view

This article addresses the key concern that organizations of all size must contend with, i.e. lack of effective Identity and Access Management (IAM) processes. The risk of not having a robust IAM system may lead to severe consequences, some of which include loss of data confidentiality, integrity, and even availability. This can inflict irreparable harm to…
Reboot Leadership Awards 2019

Anil Lamba – EXL Service, Inc.

Why Nominated: Anil Lamba is a notable industry speaker, researcher, an innovator, and an influencer with proven success in spearheading Strategic Information Security Initiatives and Large- scale IT Infrastructure projects across industry verticals. Profile: Anil Lamba has striven to change the way organizations approach security, placing an emphasis on making informed decisions regarding products and services…
IllenaArmstrong
Editorial Honeypot, Executive Insight, Opinions

Still growing after 30 years

This year has proven to be one of continued personal and professional growth for many industry friends, colleagues and me. Yet, even with the positives faced this year, there have been some of those opposing negatives. No wonder, then, there are those among us who might be just about done with 2019.    After all, cyberattackers kicked of…
Reboot Leadership Awards 2019

Richard Bird – Ping Identity

Why Nominated: Leveraging over 20-years of experience in identity and access management and security, Richard Bird serves as a thought leader on issues of identity ownership, data privacy, and new government regulations for protecting user identities. Ever a futurist, Bird proposes that the U.S. institute unique digital identifiers, and urges companies to adopt cutting-edge security frameworks…
upward graph 700px
Security News

Cybersecurity trends in 2018

End of the year wrap-ups always want to name a year something, like the “Year of Ransomware” or the “Year of Artificial Intelligence,” but it would be difficult to pin 2018 to a specific threat or trend, as so many reared their ugly heads. With that noted, it is pretty simple to define the year…
Next post in Security News