Avinaash Talekaar的更多文章
-
Payday Puzzle: The Unsettling Reality of Underpayment in Indian IT
Payday Puzzle: The Unsettling Reality of Underpayment in Indian IT
Last week, a leader from one of the major Indian IT conglomerates, self-styled as a philanthropist, was prattling on…
-
Office Politics good or bad?
Office Politics good or bad?
I often come across discussions on LinkedIn about office politics, bad managers, and various workplace challenges…
-
Title: Unleashing the Full Potential of LinkedIn in Recruitment: A Call for Active Engagement
Title: Unleashing the Full Potential of LinkedIn in Recruitment: A Call for Active Engagement
In today's rapidly evolving job market, the role of Human Resources (HR) professionals in talent acquisition has become…
Marketing Manager at ICode Breakers
1 年The comprehensive guide to the five A's of cloud identity management by LoginRadius is a game-changer for businesses seeking top-notch security and seamless user experiences. To learn more, read this blog at https://www.loginradius.com/blog/identity/guide-to-five-a-of-cloud-identity-management/
Sailpoint IIQ Developer
1 年I am interested, i am also looking for sailpoint opportunity
Identity Security Leader | Guiding Organizations through Complex CyberSecurity Transformations | Expert in CyberSecurity Compliance and Requirements
1 年Nathersha S thanks for tagging me! I would absolutely agree and offer a few clarifying points. I run a company that specializes in the Plan, Build, and Run strategies to seeing fully completed, successful Identity Security practices. Notice what I mentioned, this is bigger than just IAM as a subset of activities. Identity Security encompasses multiple pillars that include IAM, CIAM, PAM, and ZERO Trust. It's important to understand the general structure of the domain as we discuss this with clients and organizations. The other piece that is missing here and within the conversation of many organizations is processes. The technology can, AND WILL, change. The processes are immutable. The processes are what drives the tools, it's the logic that allows even an AI to function in the ways we have come to understand. Without that essential piece of the puzzle, everything falls apart. This is the exact reason I started WellSecured IT, to be the beacon of unequivocal knowledge on Identity Security in all its forms.
Lead - IT Security | Microsoft 365, Azure & Oracle Cloud Admin | CIAM | CIMP | CAMS | CC | ITIL 4 | ISO27001:2022 LI | AZ-900, MS-900, SC-900
1 年Avinash Talekar - Great Post, I couldn't agree more with your points about the importance of continuous learning in the evolving IAM domain. However, the recommended skills are way ahead to an IAM Architect kind of roles. It's hard to learn and be good with all these, as I believe each can fall into a separate vertical and concentrating in two or three and making best use of it will be helpful. Kapil Aswani Marcus W. your thoughts on this?