Risk Roundup   /     Understanding Identity Management

Description

John Willis, Founder and Chief Information Security Officer for Turnaround Security based in United States participates in Risk Roundup to discuss Identity Management. Identity Management As the boundaries of computing environment for entities across nations: its government, industries, organizations and academia expand beyond geospace to cyberspace and space; and grows from onsite to off site... The post Understanding Identity Management appeared first on Risk Group.

Summary


John Willis, Founder and Chief Information Security Officer for Turnaround Security based in United States participates in Risk Roundup to discuss Identity Management.



Identity Management



As the boundaries of computing environment for entities across nations: its government, industries, organizations and academia expand beyond geospace to cyberspace and space; and grows from onsite to off site and near shore to off shore; the security threat platform, threats and complexity also expands and brings complex security risks for all the security stakeholders.



Identity Management



As a result, managing access privileges for users, including domestic on-site / off site employees to contractors on shore / near shore to off shore is getting very complex.



Moreover, the emerging converging computing environments and many diverse computing architectures and even internet of things (IoT) devices is also getting very complex and adding to the already complex security challenges faced by security professionals. As a result, the traditional strong user name and password commonly used for managing identities across nations are not effective anymore.



Understandably, there is a growing need for effective Identity Management solutions that are strong enough to accommodate the growing complexities of not only the organizations across nations but also their complex computing ecosystem. Time is now to understand the trends shaping Identity Management.







For more please watch the Risk Roundup Webcast or hear Risk Roundup Podcast







About the Guest



John Willis, Founder and Chief Information Security Officer for Turnaround Security participates in Risk Roundup to discuss Identity Management. He has led Identity, Credential, and Access Management programs for various parts of the Department of Homeland Security.



John has over forty years of work experience, thirty years of business leadership,management, and Board experience, and over twenty years of experience in cybersecurity and privacy.



Disclaimer: Any opinions stated by John Willis are his own and not of the Department of Homeland Security.

About the Host of Risk Roundup



Jayshree Pandya (née Bhatt), Founder and CEO of Risk Group LLC, is a scientist, a visionary, an expert in disruptive technologies, and a globally recognized thought leader and influencer. She is actively engaged in driving the global discussions on existing and emerging technologies, technology transformation,and nation preparedness.



Her work focuses on the impact of existing and emerging technological innovations on nations, nation preparedness and the very survival, security, and sustainability of humanity. She believes that the reality of the imminent technological and economic singularity necessitates that Darwin’s evolution theory, a theory that has evolved from natural selection to the survival of the fittest to symbiosis to mutualism be translated and scaled from micro to macro level, and understood and evaluated from the perspective of the transformative and evolutionary changes seen across nations (largely triggered due to technology transformation and re-defining and re-designing of systems at all levels). Her research in this context evaluates the evolution of intelligence in all forms,

Subtitle
Identity Management
Duration
47:23
Publishing date
2018-12-11 19:12
Link
https://www.riskgroupllc.com/understanding-identity-management/
Contributors
  Jayshree Pandya PhD
author  
Enclosures
http://media.blubrry.com/risk_roundup/content.blubrry.com/risk_roundup/Understanding_Identity_Management.mp3
audio/mpeg