3rd Party Risk Management , Audit , COVID-19
Redefining IAM Strategy for the Cloud
Industrial Kuwait Bank's Rushdhi Mohammad on Managing Digital IdentitiesIn defining an IAM strategy for the cloud, CISOs need to automate the processes of provisioning, de-provisioning, monitoring and auditing as well as implementing federated access and API integration, says Rushdhi Mohammad, information security officer at the Industrial Bank of Kuwait.
See Also: Real-World Strategies for Securing Remote Workforces and Data
IAM must be aligned with business objectives and provide robust integration and automation options for user access, Mohammad says in a video interview with Information Security Media Group.
In this interview, Mohammad offers insights on:
- Improving identity governance aligned with PAM strategy;
- Simplifying identity and access management for enhanced security;
- Determining how practical the single-sign-on approach is.
Mohammad is an information security officer at the Industrial Bank of Kuwait. He has over 10 years of experience in information security consultation, evaluation, design, implementation, support, and maintenance of information security programs and controls aligned with business strategies.