6
Identity and Access Management
You have already heard me say a couple of times that identity is now considered the new perimeter of your organization. Because of this, the need for a mature identity and access management program is a necessity. Identity and access management needs a dedicated function within the cybersecurity program because of how important this area has become. Through the ongoing shift to work from anywhere at any time and with data centers continuing to shift to the cloud, users can now access their corporate information from anywhere over the internet. A simple breach of identity will allow an intruder to log in and access information for that compromised user, then laterally move through the network to create a lot more ...
Get Resilient Cybersecurity now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.