Digital Identity and Access to Data (IAM)

Glossary

TBD
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Home
Subscribe to: Comments (Atom)

permanently

About this blog

After 20 years working in digital Identity and Access Management from CRM to UEBA and even longer in digital transformation, I tend to recognize recurring "patterns" to problems and solutions in the industry. As a contractor working at different places, I have even more exposure to different projects. Like identity, those very attributes that make us unique, can also be used to group. What is new problem to some, is usually something others have solved.

In every engagement, I usually try share what I know and mentor and develop any who may wish to learn. "Knowledge has no value until shared". But engagements usually have scope and a deadline and I felt I needed an outlet unbound by financials or project. Hopefully some of this is helpful to others in the industry, but if it helps 1 person pick IAM as a career, I would consider it a resounding success.

About Me

My photo
Ivan
Toronto, Ontario, Canada
My Background is in digital strategy and cyber security
View my complete profile

Search This Blog

Pages

  • Home
  • Glossary

Blog Archive

  • ▼  2020 (21)
    • ▼  Feb 2020 (18)
      • Importance of Defining Authoritative Sources
      • Something you know, something you have, something ...
      • Are you putting enough focus on IAM?
      • Mind The Gap - mystical authorities of obscurity
      • Data Stores - Entitlement Book of Record (EBoR)
      • Data Stores: Entitlement Catalogue / Product Catal...
      • Data Stores : Identity Book of Record (IBoR)
      • What is a "Closed-Loop"
      • The Importance of Defining Credential Types
      • An Identity Centric Security Framework
      • IAM Debt and Deficit
      • Whats your Book of Record?
      • The Hype of "Zero Trust" and Getting Identity Right
      • "Another" 4 Pillars of IAM
      • What is in a name?
      • 11 Types of IAM Professionals (Satire)
      • Getting down to the root cause of breaches
      • Periodic Rotation of Secrets
    • ►  Jan 2020 (3)

Subscribe To

Posts
Atom
Posts
All Comments
Atom
All Comments

Copyright

"This is a noncommercial, personal blog. NOT a paid deliverable publication, nor a final archive of all my thoughts expressed in writing and is therefore not a product rich in gate-keeping and editing. This means that while the ideas and thoughts may be a product of a long gestational period, the writing itself is not. It is essentially as it came from the keyboard: spontaneous, unproofed, unrevised, and corrected afterward only when necessary to convey intent.

The opinions expressed here represent my own and not those of my current or past employers. Learning and understanding is a continuous process, and posts reflect my personal viewpoint at the time of writing. Rarely does one have all the answers on the first day of a worthy project and sometimes its years later that some insight is triggered. I may appear to randomly change my mind or opinion.

The intent is to share and by putting thoughts into words to both develop personally and in hope to spur others in the industry to improve upon. So feel free to re-share, comment and expand upon as you wish. I am unlikely to be the first or only one to have these thoughts, however where possible I will recognize the thoughts and ideas of others as their own. Giving credit where due and my hope would be that others would treat my thoughts and ideas the same. Some names and other identifying details have been changed to protect the privacy of identities.

Simple theme. Powered by Blogger.