CSO Perspectives 9.7.20
Ep 21 | 9.7.20
Identity Management: around the Hash Table.
Show Notes

Three members of the CyberWire’s hash table of experts

  • Helen Patton - CISO - Ohio State University
  • Suzie Smibert - CISO - Finning
  • Rick Doten - CISO - Carolina Complete Health

discuss the things they worry about when it comes to identity management.

Resources:

"AN H-ISAC FRAMEWORK FOR CISOsTO MANAGE IDENTITY,” H-ISAC, April 2020. 

An Introduction to Identity Management,” By John K Waters, CSO, 15 October 2007.

Cybersecurity first principles: zero trust,” by Rick Howard, The Cyberwire, 18 May 2020.

"IDENTITY FOR THE CISO NOT YET PAYING ATTENTION TO IDENTITY,” H-ISAC. 

What is IAM? Identity and access management explained,” by James Martin and John Waters, CSO, 9 October 2018.

What is Identity and Access Management and Why is it a Vital IT Security Layer?” by Matt Miller, BeyondTrust, 29 November 2018.