Remove Development Remove IAM Remove Management
article thumbnail

Leadership in Cybersecurity

N2Growth Blog

Below is a list of security initiatives that a security leader would either manage or have parallel impact upon within a business: Data security. Vendor management. Identity & Access Management (IAM). Vulnerability Management (VM). Policy & controls development with implementation. Data storage.

IAM 250
article thumbnail

You, Too, Can Move Your Company Into the Cloud

Harvard Business Review

Identity Access Management (IAM) vendors have been forced to consider brokering authentication for Active Directory because companies feel like they must stay on it as an internal authentication platform. The last bit of wisdom is to develop the most thorough 1-, 3- and 5-year cloud strategy that you can put down.

article thumbnail

Why the U.S. Needs More Worker-Owned Companies

Harvard Business Review

nonprofit organizations like the Heartland Capital Strategy Institute are bringing together institutional investors, private asset managers, and worker representatives to harness some of the $13 trillion of assets in workers’ pension funds to invest in worker-friendly businesses that offer good investment returns. Already, U.S.

ESOP 15