June 15, 2015 By Nick Oropall 2 min read

With the ongoing focus around security risk and compliance, governance is a hot topic within identity and access management. While identity governance is valuable for securing user access, properly deploying a governance solution can be a tricky endeavor.

In a recent webinar, IBM and KuppingerCole brought together two identity governance gurus to discuss some of the challenges and rewards of identity governance implementations. Mike Small, a fellow analyst at KuppingerCole, opens the webinar up by discussing the governance challenges that the world’s agile connected businesses are facing. Then Andrea Rossi, IBM’s worldwide identity governance sales leader, describes how IBM works to solve those challenges and provide security for all kinds of businesses.

Small begins by defining the new ABC — Agile Businesses Connected. The example he uses is a U.K.-based television company that can now identify viewers of a television show within 60 minutes in order to sell targeted advertising via social media. While this may be just one example, it represents where the marketplace is going. Organizations want to connect with their users in an effort to make faster and more efficient business decisions. But this isn’t easy. Some of the challenges Small sees clients facing revolve around the need to balance benefits, such as the ease of use and accessibility of applications and data, with compliance and risk, need for access, cloud and bring-your-own-device (BYOD) functionality and awareness of cybercrime.

Andrea Rossi follows by taking the audience through some of his customer experiences in the past 10 years, noting how these relate to managing the risk of identity governance. He uses this experience to discuss the four typical starting points for an identity governance project and the lessons he has learned from each one. The three simple pieces of advice he leaves with the audience are: to devote a significant effort to translation, to enlarge your identity governance vision and to talk risk.

Small and Rossi finish off the session by answering questions from the audience that make this David Bowie-themed webinar one that you don’t want to miss.

To get the full experience of the webinar, watch it on demand or listen to the podcast version of the event. There will be more events like this one in the near future. Registration is open for another webinar, titled, “Identity Governance: Not Just for Compliance,” which is taking place June 24.

More from CISO

Making smart cybersecurity spending decisions in 2025

4 min read - December is a month of numbers, from holiday countdowns to RSVPs for parties. But for business leaders, the most important numbers this month are the budget numbers for 2025. With cybersecurity a top focus for many businesses in 2025, it is likely to be a top-line item on many budgets heading into the New Year.Gartner expects that cybersecurity spending is expected to increase 15% in 2025, from $183.9 billion to $212 billion. Security services lead the way for the segment…

On holiday: Most important policies for reduced staff

4 min read - On Christmas Eve, 2023, the Ohio State Lottery had to shut down some of its systems because of a cyberattack. Around the same time, the Dark Web had a “Leaksmas” event, where cyber criminals shared stolen information for free as a holiday gift. In fact, the month of December 2023 saw more than 2 billion records breached and 1,351 disclosed security incidents, according to research from IT Governance — an increase of 332% and 187%, respectively, over the month of…

Overheard at RSA Conference 2024: Top trends cybersecurity experts are talking about

4 min read - At a brunch roundtable, one of the many informal events held during the RSA Conference 2024 (RSAC), the conversation turned to the most popular trends and themes at this year’s events. There was no disagreement in what people presenting sessions or companies on the Expo show floor were talking about: RSAC 2024 is all about artificial intelligence (or as one CISO said, “It’s not RSAC; it’s RSAI”). The chatter around AI shouldn’t have been a surprise to anyone who attended…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today