Whitepaper Download
For those of you looking to download a copy of Strategies for Creating an Authoritative Store, it is now available from the SECUDE Global Consulting website. The paper was initially released through...
View ArticleIdentity Management 2.0
I saw an interesting article that discusses the concept of Identity Management 2.0. The article starts with a good recap of current, or Identity Management 1.0 capabilities, that we are all familiar...
View ArticleWhen Enterprise Systems Collide…
It’s no secret that there are many systems in the Enterprise and that sometimes they seemingly come into conflict. How many places are there where one can: Change information about themselves Change...
View ArticleProject Scope and Sustainability
One thing I’ve noticed when talking to people about Identity Management projects involves how to determine the project’s overall scope. “How do I scope this?” they will say to me. Now that’s kind of...
View ArticleSystem Shock
The negative sell is always the hardest to make, ”Do this to prevent this horrible outcome”. You rarely know if you were successful or not. The great leader stands on the rubble of the collapse with...
View ArticleA Need for Standards
I came across an interesting eWeek Blog entry. In it, Michael Vizard makes some interesting points about lack of standards in Identity Management. He makes some valid points in that there is no real...
View ArticleIdentity Theft and Enterprise Identity Management
When I tell people that I work in the Identity Management field, the first comment is usually something like, “Wow, identity theft, cool stuff. What should I be doing to protect myself?” Sometimes...
View ArticlePart II of Security Architecture and Design
The second part of my series on security architecure and design is up a Risk Intelligence. In this post I look at the modular operators and give examples of how they have been used in security...
View ArticleThe Transition from CRG to GRC
I’m an Identity and Access Management kind of guy. I don’t pretend to deny it, however sometimes it does cloud some of my views of the rest of the enterprise. Take the GRC concept for example. As an...
View ArticleThe other side of the article
It’s seldom that I publish more than one blog post on a single piece, but Mark Diodati’s article “Changing times for identity management ” (login required) spoke of two main themes that I felt needed...
View Article
More Pages to Explore .....