Blog: Identity. Governance. Analytics.

One of the most common source of insider threat is user/system acquiring unauthorized access to an application bypassing in-place Identity Governance processes (Ex. modifying application's security configurations/policy by application administrator)....

Business need: A holistic view of information security management in an organization with the purpose of: Measuring effectiveness of a security control or policy. How realistic were my ROI forecasts...