February 16, 2016 By Security Intelligence Staff 2 min read

Authored by Daniel Poliquin, Principal of Deloitte Advisory Services.

You’ve likely heard tourists talk louder and louder as they try to communicate with locals who speak a different language. Business leaders and IT teams often have a similar language gap. It’s no wonder that technical solutions frequently don’t solve the business need they were intended to fill.

Many companies have very little to show for the vast amounts of time and money they’ve spent trying to prevent cyberthreats and improve IT system security. That could be because these enterprises have viewed identity governance as an IT problem when it’s really a business problem.

Identity Governance: A How-To

For the business to function efficiently, the right people need the appropriate level of access to the right systems at the right time. The business also needs system flexibility to develop new operating models, streamline processes and break down silos to continue to create sustainable value.

To effectively address these risks and opportunities, the business has to be actively involved in delivering an identity governance program that works. Here are a few tips for launching a business-led approach:

  • Start with a clear vision. What does an effective and efficient identity governance program for your enterprise look like? Which assets are critical to protect? Who needs access to these assets? Why do they need access? When do they need access? How does this compare to your current state?
  • Align key players. Bring together influential people from the business, IT and security to work together to fulfill your vision. Many companies also bring in a third-party adviser who is experienced in business transformation and implementing effective identity governance programs. These advisers should be able to translate business needs into technical requirements and vice versa.
  • Develop the transformation plan. Many organizations have morphed over time, creating a hodgepodge of systems, processes and roles. Before a technical solution can be effectively implemented, organizations must have a plan to streamline and standardize their operations. This business plan then drives the technology plan.
  • Implement the plan. When the business and IT share a common vision of the end state, they are more likely to gain the support of the people within their organizations and deliver a governance program that’s supported across the enterprise.

Of course, any transformative project is difficult to pull off, but we have found that when the business and IT are both actively engaged, the result is a more vigilant, resilient and secure enterprise.

Learn More

Attend IBM InterConnect 2016 in Las Vegas to join me and Andrea Rossi, vice president of Identity Governance and Intelligence Sales at IBM, as we discuss how leading organizations are dealing with identity governance.

Our presentation “Identity Governance: The Good, the Bad and the Ugly” provides an overview of trends driving the need for identity governance, how IBM’s new governance offerings bolster compliance and the top reasons why your business needs identity governance. The talk is scheduled for Monday, Feb. 22, at 4:30 p.m. in Mandalay Bay’s South Lagoon A.

More from Identity & Access

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

From federation to fabric: IAM’s evolution

15 min read - In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that process (technically possible, not always advisable). But what is the next step in our evolution towards greater interoperability between our applications, services and systems?Identity and…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today