Identity Management is Here to Stay

Identity Management is Here to Stay

Los Angeles, Calif. – May 25, 2020

Not long ago if you had asked any security pro about how they protect their perimeter, they would have said - firewalls. In fact, when I started Herjavec Group over 15 years ago, we were the first firewall reseller in Canada!  

Today, the security landscape looks a lot different – especially with entire workforces forced to work remotely due to COVID-19. When my team was prepping for Herjavec Group’s 2020 Cybersecurity Conversations report, I asked them a simple question: “What is the foundation of security?” 

The answer from our internal thought leaders was almost unanimous – Identity.  

As the perimeter disappears and organizations are experiencing (voluntarily or not) digital transformation, it’s clear that Identity is the answer to many of your security challenges.  

Five years ago, it used to be that digital transformation was something only the big guys could afford. Today, it’s necessary for all organizations. In response, as security and business leaders, we all have to start embracing context-aware security programs and Identity management solutions.  

Think of the newest tool you onboarded. Maybe it’s Expensify for the Finance team or Hubspot for sales and marketing. If you want to enable ease of use for your teams AND protect against malicious use of the tool and the data, you need identity management solutions. There’s no other way around it.  

I firmly believe that the best way to secure your digital transformation is by using context-driven identity management programs. When you take this approach you stop asking questions like “what data do I have access to” and focus more on questions like: 

  • Do I know who my users are and what context they operate from?  
  • What data is a user requesting? 
  • How is the user connecting to my environment? 
  • Why are they requesting the data? 
  • When are they requesting the data? 

 Do you see how the questions have shifted from only focusing on the data to focus on who has access to the data?  

When I have conversations with C level executives there is often a big gap between their solid understanding of identity management, and what they’ve actually put into practice across their enterprises.

I get it – Identity is a beast and introducing an advanced program can be cumbersome and complicated. Don’t get me started on the effort to manage it on a go-forward basis... 

Don’t know where to start? Don't know how mature your organization’s identity program really is? My advice is always to understand the rules of the game you’re playing. What coverage do you have? Where are you at today? What’s your goal?

I’m seeing enterprise leaders make an initial investment in security workshops and let me tell you – they're paying dividends!! A well-designed workshop is basically an executive consulting engagement that can set you and your identity program up for success. Taking the time to build out a workshop will help your team: 

  • Gain a clear understanding of the current state of your identity controls & capabilities 
  • Develop a clear vision of the Desired State (your end goal) 
  • Set program and roadmap milestones to help you move towards the Desired State 
  • Understand how your people, processes, and technology investments need to adapt to help you get there...  

As I’ve said – Identity can be complicated so don’t bite off more than you can chew all at once. It’s a mistake to jump into a quick deployment (hint – they're never QUICK) without considering the true impact to your enterprise.  

When it comes to securing your digital transformation, my advice is simple. Start with Identity.   

It really is the foundation of security.  

To Your Success,

RH

Thank god for cyber security! In an instance your life could change for ever. It’s well worth keeping all your documents safe. Importantly, your Identity! If you don’t have it GET IT!!!!!

回复
Freelancer Rony

Work on graphic design at Fiverr

4 年
回复
James Gilles

CIO | CTO | IT Executive | VP Information Technology

4 年

With so many individuals outside "the wall" requiring access to resources "inside the wall", it is critical to control the gates in the wall. Authenticating who is requiring access, only opening the appropriate gate for the authenticated user, and only providing minimum necessary access through the opened gate to resources "inside the wall" are critical tenants in CyberSecurity for our New Normal.

VINCO BLACK TEA Single grown original CEYLON BLACK TEA. www.vincousa.com

回复

要查看或添加评论,请登录

Robert Herjavec的更多文章

  • 10 Things I Learned from Charlie Munger

    10 Things I Learned from Charlie Munger

    What does it mean to be a ‘billionaire’ I had the privilege of meeting many highly successful people in my travels…

    172 条评论
  • 10 Things I Learned from Mark Cuban

    10 Things I Learned from Mark Cuban

    I have now been doing Shark Tank for almost 20 years. Kevin O’Leary and I started with the show in Canada (called…

    318 条评论
  • How to Build Cyber Resiliency for the Evolving Threat Landscape

    How to Build Cyber Resiliency for the Evolving Threat Landscape

    Welcome to 2022! In last year’s Cybersecurity Conversations Report, we discussed what the massive digital…

    33 条评论
  • Data Privacy Day - How to Enhance Your Data Privacy

    Data Privacy Day - How to Enhance Your Data Privacy

    January 28th is Data Privacy Day, an international effort to empower individuals and support businesses in the endeavor…

    41 条评论
  • A Look Back at Cybersecurity in 2021

    A Look Back at Cybersecurity in 2021

    Every year as December winds down and the New Year approaches, I reflect and look back at the year I'm leaving behind…

    23 条评论
  • 3 Steps For Developing a Culture of Security-Driven Business

    3 Steps For Developing a Culture of Security-Driven Business

    I posted this piece a few months ago, but as we enter the last month of the year, it's a great time to reflect on where…

    16 条评论
  • 7 Tips to Stay Cyber Safe While Online Holiday Shopping

    7 Tips to Stay Cyber Safe While Online Holiday Shopping

    I’ve been in infosec for over 30 years and have had the great privilege of evolving and learning as a cybersecurity…

    28 条评论
  • #CreateYourSuccess: Never Get Comfortable

    #CreateYourSuccess: Never Get Comfortable

    I’m a big believer in falling down 7 times, but getting up 8. I try to relay the importance of being resilient and…

    132 条评论
  • #CreateYourSuccess: 2020, A Lesson in Resilience

    #CreateYourSuccess: 2020, A Lesson in Resilience

    I’m a big believer in falling down 7 times, but getting up 8. I try to relay the importance of being resilient and…

    119 条评论
  • #CreateYourSuccess: Someday is Not a Real Day

    #CreateYourSuccess: Someday is Not a Real Day

    I’m a big believer in falling down 7 times, but getting up 8. I try to relay the importance of being resilient and…

    106 条评论

社区洞察

其他会员也浏览了