Listen

Description

Merriam-Webster defines identity as “the qualities, beliefs, etc., that make a particular person or group different from others.” These qualities are what make identity relevant to the concept of security.

Digital transformation and the increasing reliance on remote business continue to accelerate the adoption of new approaches for securing an individual’s identity and his or her rights to access information and systems in the cloud.

IT leaders, for their part, face new business demands that require digital trust across every interaction and channel, and the imperative for 2022 is the need to empower IAM teams to support ongoing change driven by the evolution of technology best practices and change in organizational priorities, user expectations, and opportunities and threats.

In today’s PodChats for FutureCISO, we are joined by Jeffrey Kok, Vice President of Solution Engineer, Asia Pacific and Japan, CyberArk.

1.       What is identity security? 

2.       IT security has been around for decades, why is the term “identity security” only been more pronounced in recent years? 

a.       Where does “identity security” sit in an organisation’s overall security strategy?

3.       For an organisation that already has an identity access management solution in place, does that mean the company has covered “identity security”?

4.       What is a best practice for determining if an organisation’s existing IAM approach fails to meet the fundamentals that “identity security” promise?

5.       Are all identity security platforms equal? How do I determine if ‘a’ platform is suitable for my business?

6.       What should be top of mind for the CISO looking at identity security solutions as part of the company’s overall security strategy?