CyberTalk

Top trends: Identity access management amidst coronavirus

EXECUTIVE SUMMARY:

What are we seeing?

Organizations are aggressively pursuing the implementation and expansion of identity and access management (IAM) technologies. Nearly 60% percent of business decision-makers rank this objective as a priority.

Identity verification enables security leaders to quickly detect malicious users on the networks. This is of increasing importance in the era of working-from-home and remote access to corporate resources.

“The reality is that no one really plans to have their entire company [start] work[ing] from home in the space of 48 or 72 hours…Being able to manage user access and private network access is a big challenge,” says CISO John Masserini,  for an international telecommunications company. But a hacker who successfully infiltrates a network presents the biggest challenge of all.

Why infiltrate a business?

From the perspective of a cyber criminal, infiltrating a business’s network is an attractive proposition for the following reasons:

How has the landscape shifted in recent months?

“What I’m seeing is an acceleration of what would normally take several years happening in one year,” said Gary Gooden, CISO for Seattle Children’s Healthcare System.

IT professionals in healthcare have had to reconfigure identity access management systems to keep up with continual staffing changes and reassignments. A nurse who’s normally stationed in the cardiology unit may now routinely work in the post-coronavirus rehabilitation center.

For more information on identity access management in the age of the coronavirus, visit The Wall Street Journal.

Exit mobile version