Identity Management: around the Hash Table.
Three members of the CyberWire’s hash table of experts
- Helen Patton - CISO - Ohio State University
- Suzie Smibert - CISO - Finning
- Rick Doten - CISO - Carolina Complete Health
discuss the things they worry about when it comes to identity management.
Resources:
"AN H-ISAC FRAMEWORK FOR CISOsTO MANAGE IDENTITY,” H-ISAC, April 2020.
“An Introduction to Identity Management,” By John K Waters, CSO, 15 October 2007.
“Cybersecurity first principles: zero trust,” by Rick Howard, The Cyberwire, 18 May 2020.
"IDENTITY FOR THE CISO NOT YET PAYING ATTENTION TO IDENTITY,” H-ISAC.
“What is IAM? Identity and access management explained,” by James Martin and John Waters, CSO, 9 October 2018.
“What is Identity and Access Management and Why is it a Vital IT Security Layer?” by Matt Miller, BeyondTrust, 29 November 2018.