3rd Party Risk Management , Audit , COVID-19

Redefining IAM Strategy for the Cloud

Industrial Kuwait Bank's Rushdhi Mohammad on Managing Digital Identities
Rushdhi Mohammad, information security officer, The Industrial Bank of Kuwait

In defining an IAM strategy for the cloud, CISOs need to automate the processes of provisioning, de-provisioning, monitoring and auditing as well as implementing federated access and API integration, says Rushdhi Mohammad, information security officer at the Industrial Bank of Kuwait.

See Also: Real-World Strategies for Securing Remote Workforces and Data

IAM must be aligned with business objectives and provide robust integration and automation options for user access, Mohammad says in a video interview with Information Security Media Group.

In this interview, Mohammad offers insights on:

  • Improving identity governance aligned with PAM strategy;
  • Simplifying identity and access management for enhanced security;
  • Determining how practical the single-sign-on approach is.

Mohammad is an information security officer at the Industrial Bank of Kuwait. He has over 10 years of experience in information security consultation, evaluation, design, implementation, support, and maintenance of information security programs and controls aligned with business strategies.


About the Author

Geetha Nandikotkur

Geetha Nandikotkur

Vice President - Conferences, Asia, Middle East and Africa, ISMG

Nandikotkur is an award-winning journalist with over 20 years of experience in newspapers, audiovisual media, magazines and research. She has an understanding of technology and business journalism and has moderated several roundtables and conferences, in addition to leading mentoring programs for the IT community. Prior to joining ISMG, Nandikotkur worked for 9.9 Media as a group editor for CIO & Leader, IT Next and CSO Forum.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.