Privacy-by-Design technical and business process engineering important for solving business GDPR compliance challenges. But the privacy issues and enforcement questions around GDPR are pretty complex. How should companies begin?
Dan Beckett will be speaking Thursday at the following event. If desired, please register with the Meetup group at this link.
DATE and TIME:
Thursday, August 17, 2017
3:30 PM to 6:30 PM
Dave and Buster’s
13857… Continue reading
Agile risk management – is it even possible? This is our second of two posts ruminating on agility versus security. Today, you’ll see that an agile risk management framework like the one in the figure below is feasible, and that… Continue reading
Agile security has emerged as a core topic for us in two cutting edge consulting engagements over the past few months.
The first of these engagements is to help a very large client develop and mature an enterprise risk management… Continue reading
Digital identity’s center of gravity has shifted to customer-facing identity (CIAM). As we learned in the changing face of identity (part 1 of this post), effective CIAM is crucial.
Ian Glazer, who inspired my last two posts… Continue reading
Please join us in Minneapolis on May 24th for an inspiring breakfast with IAM thought leaders and executives like yourself. This will be an opportunity to hear us discuss critical components of IAM, as well as an occasion for networking… Continue reading
We will be attending the European Identity & Cloud Conference 2017, taking place May 9 – 12, 2017 at the Dolce Ballhaus Forum Unterschleissheim, Munich/Germany. The EIC 2017 is Europe’s leading event for Identity and Access Management (IAM), Governance,… Continue reading
Digital identity is the core of the digital transformation. It underpins sales and distribution, enables outreach to customer communities, and helps build business value chains. But organizations must traverse a minefield of threats, operational challenges, and compliance issues. As we… Continue reading