As the global Business landscape continues to shift, governing access to applications, controlling privileges that should be granted, and defining an appropriate risk tolerance is becoming even more elusive. This can be further compounded by B2E, B2B, and B2C users inadvertently misusing and mishandling data such as credentials, certificates, trade secrets, PII, PCI, and PHI.
In order to address the related financial, legal, operational, and reputational risks, Identity Governance combines a prescriptive blueprint for effectively identifying and converging the foundational pillars of IAM with a right sized and resilient GRC solution/program. Importantly, this also incorporates a Zero Trust Model of relevant security and technical controls.
As a result, organizations are able to prioritize, manage, and mitigate cyber risks that align with their business goals and objectives.
Come join us for PART 1 of a 3 part series on Identity Governance where we further explore these issues.
Chuck brings 20-plus years of infrastructure and security experience and relevant leadership to Fishtech. His talent for aligning technology to organizational strategy is exceptional.
Previously as VP of Enterprise Architecture for Fishnet Security, he helped build and manage the cloud, data center, and virtualization practice. His team bridged the gap between security and next-generation computing environments. As CISO for the University of Kansas, he built the security program for the KU campus, including risk management, compliance, forensic analysis, governance, application, and network security. As KU’s Deputy CIO, he oversaw and managed the University’s cable plant, data centers, voice systems, network, and servers.
Chuck has led several teams building data centers in public, hybrid, and private cloud design, as well as in SDN-enabled research labs and environments.
Over the past 22 years, Shawn has led and supported teams in the healthcare, legal, educational, manufacturing, retail, financial, insurance, and service provider verticals as a CTO, Director of IT, Principal Architect, Principal Consultant, and Data Network Analyst.
Bob Rabbitt is an IT professional with more than 15 years of experience implementing IT solutions, as well as leading Project and Managed Services organizations. Bob has used his unique background in development and operations to help solve problems that impact the entire organization.
Leading Organizations to a More Secure Future