Subcategories from this category:

Business

Peer Insights: Wisconsin IAM User Group

We’re always looking for ways to get involved with local colleagues in the IAM space. In a recent session, we met with some of our peers at the Wisconsin IAM Meetup group in Waukesha, WI. I wanted to share some detail on these local Meetups, as there is benefit for technical, business and sales roles within the IAM space.

If you’re not familiar with the IAM Meetups, initially these began as a place for Ping Identity customers to get together. But after several meetings, the groups emerged as partnerships between multiple vendors. Now the goal is to create local communities focused specifically on Identity and Access Management (IAM), and strive to be vendor agnostic and educational to better serve the attendees. They’re also a great forum to get to know other colleagues with similar IAM roles and challenges.

The meetings typically work like this: we start with networking time, beverages and snacks, and then move to presentations, panel discussions or other interactive discussions. There is also plenty of time for one-on-one discussions and networking. Axiomatics works in partnership with other IAM vendors to help plan and host these events. In particular, the group in Wisconsin was created in 2015 through partnership with Radiant Logic – Al Cocconi and I have been cohorts in building it since that time.

We’ve since gained traction and great participation from local IAM professionals around the country. Our Wisconsin group boasts a member list of nearly 200 attendees and regularly draws Wisconsin-based companies such as Aurora Health Care, Brookdale Senior Living, Harley-Davidson, Kohl's, Manpower, Northwestern Mutual, ProHealth Care, and SC Johnson (to name a few).

We had a great line-up of contributors for this session. Keith Kunkel, Senior Information Processing Consultant at the University of Wisconsin-Milwaukee, Lubar School of Business, led the meeting and started the introductions. Our first scheduled speaker was Guarav Sheth, Senior Manager Cybersecurity with Ernst & Young. Unfortunately, his travel to Milwaukee was cancelled due to Winter Storm Niko. Thankfully our second presenter, Dan Beckett, Managing Partner and Executive Advisor at Security Architects Partners was happy to step up and extend his talk.

Dan led a dynamic and engaging presentation with the theme, "Time is Not on Your Side: Leading IAM Practices to Avoid Catastrophe." Focusing on five main tenants of good security practice, he encouraged deeper discussion and real world examples of information security. One of our attendees, Jane McCormick, an Information Security Analyst at Associated Bank, remarked that "These detailed discussions around best practices are exactly why I find this group so beneficial."

The talk sparked some meaningful sharing of ideas for everyone in the room, and plans for follow-up meetings and discussions after the event. Talking with Dan afterward he explained, "This meeting was one of the most interactive sessions I've had the pleasure of moderating. I thought the attendees were very engaged and really contributed some great anecdotes and experiences that benefitted everyone, myself included."

The Wisconsin IAM User Group has already scheduled our next meeting for Wednesday, May 17, 2017, and I hope you can join us. We strive to find locations that are between Madison and Milwaukee for convenience. You can find more information about the group and links to past meetings at our Meetup page here: https://www.meetup.com/MilwaukeeIAM/. A full listing of the cities, upcoming dates, and Meetup sites for the IAM User Groups can also be found here: https://www.radiantlogic.com/learning-center/events/user-groups/ 

Continue reading
206 Hits
0 Comments

How Using ABAC Can Improve API Security in 2017

During Gartner’s recent IAM conference, I noticed an emerging conversation around the issues of API usage at the enterprise level. Enterprise adoption of APIs is viewed as an inevitable consequence of the ongoing digital transformation many IT professionals are managing.

API stands for Application Programming Interface and they help developers create applications that communicate easily with other applications and services. APIs are the backbone of any application ecosystem, which are a huge part of the trend towards digital transformation. All of those applications talking to one another are generating a huge amount of user data that enterprise companies need to be prepared to manage and secure.

Continue reading
416 Hits
0 Comments

Top Five Trends to Transform Enterprise Security in 2017

Our experts at Axiomatics got together at the end of the year to take a look at the trends in store for 2017. Some of these may sound familiar, as the era of digital transformation continues to expand. But you'll find a common theme: Marty Leamy, our Americas President said it best, “This year’s trends examine the evolving ways organizations can realize better enterprise-wide security with the exploding amounts of data that enterprises need to protect. Business executives are demanding better enterprise-wide security for all of their data, not only for regulatory compliance but also to protect their most critical assets.”

Attribute Based Access Control can help you address these areas that will challenge access control across your enterprise. Read on for the Top Five! 

Continue reading
399 Hits
0 Comments

Customer Identity, Contextual Security, and More: What We Learned at Gartner’s 2016 IAM Conference

Customer Identity, Contextual Security, and More: What We Learned at Gartner’s 2016 IAM Conference

This year’s Gartner IAM Conference was full of thoughtful keynotes and a reflection of things to come for IT professionals in 2017. Over 1500 professionals concerned with keeping customer and proprietary data more secure attended the conference last week, which took place in Las Vegas, Nevada, one of the riskier cities in the United States (if you like blackjack, that is).

Richard Holland of Eli Lilly had an opportunity to share how they’ve used various capabilities in their IAM ecosystem to drive the development of new medicines. He shared the impact of implementing ABAC in his talk, "Bringing IAM and ABAC from Strategy to Production, with the Business, in Medicines Development” and gave context to how ABAC works within the IAM ecosystem. He was one of many great speakers in the summit's expert lineup.

What’s Next in IAM?

There were many interesting conversations happening last week. Below are three crucial topics we heard discussed at length across the conference floor, that we believe are the most pressing for IAM and IT executives in 2017.

Continue reading
638 Hits
0 Comments

How Big Data is Driving Evolution in Identity and Access Management

big Data Gartner2 blogpage

What is Big Data and Why You Should Care

In a previous post, I discussed some of the security challenges awaiting companies looking to leverage the explosion of Big Data. The term itself - “Big Data” - is sort of vague. What do we mean when we say Big Data? Is it the size of the data files? The number of files?

Continue reading
843 Hits
0 Comments

Gartner's IAM Summit: A Beginner's Guide to Digital Transformation

Gartner's IAM Summit: A Beginner's Guide to Digital Transformation

transformation blog 

Axiomatics is heading to Gartner’s annual Identity and Access Management (IAM) Summit on November 29 at Caesar's Palace in Las Vegas. By the time the event concludes on December 1st, the 1600-plus attendees will have a better understanding of the most pressing security issues facing digital leaders today. We know governance, processes and controls, and the cloud will be top of mind for most attendees, however, a number of new topics are beginning to emerge organically in the security space. The most prevalent and impactful of these is Digital Transformation.

If you’re new to the concept of IAM, or just want to be able to hold your own at cocktail hours, we’ve written an overview of the Foundations of IAM.

Tags:
Continue reading
1020 Hits
0 Comments

Security, Dynamic Authorization and the Big Data Landscape

Security, Dynamic Authorization and the Big Data Landscape

The big data landscape is, not surprisingly, big. Matt Turck’s excellent blog (mattturck.com) has good coverage on the development in this area and captures how much the landscape has grown over the past few years. The figure below, created by Turck, captures the vendors in the Big Data landscape, divided by the functional aspects of their products.

Continue reading
1009 Hits
0 Comments

We’re heading to London - see you at the Identity Management Event!

This Wednesday, November 9th, Axiomatics and other industry leaders from large enterprises and government agencies alike will attend IDM UK in London. This will be the 14th bi-annual identity management meeting held by Whitehall Media, and as we draw to a close on 2016, attendees of this summit will discuss new opportunities and trends to move forward in digital business with the incoming new year.

Continue reading
326 Hits
0 Comments

The Big Data Security Challenge

Big data is one of the “big” industry trends that is challenging enterprises these days, especially from a data security perspective. Thanks to the explosion of Big Data, the Internet of Things (IoT), and global mobilization, the way companies use, collect, store and process data has changed forever. If we look back to 2011, IT analysts IDC published the “Extracting Value from Chaos” report[1], in which they announced, “While 75% of the information in the digital universe is generated by individuals, enterprises have some liability for 80% of information in the digital universe at some point in its digital life.”

Continue reading
892 Hits
0 Comments

ABAC, the dynamic authorization solution for your APIs and Applications

ABAC, the dynamic authorization solution for your APIs and Applications

Scale the heights of enterprise access control:

IT and security leaders in large organizations often find themselves standing at the foot of a daunting mountain. That mountain is a mandate from their leadership to “improve security,” “do a better job in protecting data,” and “improve visibility on who can see what data and when it is accessed.”  And,do this for the entire enterprise.

Continue reading
815 Hits
0 Comments