Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Identity Management

Welcome to the Identity Management topic!

In this topic you may collaborate with your peers by participating in discussions, adding links and documents, and starting or contributing to wikis.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
515 Members
1 Online
7161 Visits

Community Leader

Kenneth687

Kenneth687

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 39 total

Must be a Topic member to contribute
View All »
After of a month of discussion on the Mozilla Security Development Forum (https://groups.google.com/forum/#!forum/mozilla.dev.security.policy), Chrome is the first browser to take action over Symantec questionable SSL issuance practices. The fallout could...
Kenneth687 | 5/4/2017 1:11:42 PM | COMMENTS(1)
NIST released a Small Business Guide to Information Security which is interesting has anyone seen it? http://nvlpubs.nist.gov/nistpubs/ir/2016/NIST.IR.7621r1.pdf. It is written as an interagency report which is a best practices style document. It's writte...
Kenneth687 | 3/20/2017 2:27:04 PM | COMMENTS(2)
Curious from the group, what technical skill sets are important to an identity management professional? I can't find anything specific, but two good sources popped up. The US National Institute of Standards and Technology (NIST) National Initiative for Cy...
Kenneth687 | 3/1/2017 1:57:44 PM | COMMENTS(5)
Afternoon everyone, This is a cross post from a couple different Knowledge topics. I am doing some market research on how PKI is used in different sectors and organizations as well as which products. The best I can see from public research is SSH and publ...
Kenneth687 | 3/1/2017 1:53:15 PM | COMMENTS(5)
Google released a blog post today on a practical technique to generate a SHA1 collision in other words a practical attack against the SHA1 algorithm. If you are using SHA1 algorithms, might be a good time to migrate. https://security.googleblog.com/2017/0...
Kenneth687 | 3/1/2017 1:51:39 PM | COMMENTS(1)
The latest ISACA Journal (Volume 1, 2017) has another interesting article on Privileged Access Management (PAM) capability framework. Most of the latest breaches use some form of privilege or permission escalation to create a permanent foothold in corpora...
Kenneth687 | 2/23/2017 9:46:11 AM | COMMENTS(0)

Documents & Publications: 12 total

Must be a Topic member to contribute
View All »
A good guide on how to tailor trust stores. This one is specific to trusting U.S. Government certificates, but could be used to tailor a PKI trust store for other root CAs.
Posted by Kenneth687 88 days ago
A primer on the U.S. Government PKI.
Posted by Kenneth687 88 days ago
The Identity Management audit/assurance review will provide management with an independent assessment relating to the effectiveness of identity management and its policies, procedures and governance activities.
Posted by Kenneth687 242 days ago
Posted by ISACA 727 days ago

Events & Online Learning: 0 total

No Results Found

Journal Articles: 5 total

Volume 5, 2013
by Srikanth Thanjavur Ravindran
Effective governance along with automated role management, authentication, user profiling and integration are keys to establishing a holistic IAM solution.
Volume 6, 2011
by Harmeet Kaur, CEH
As today’s business climate demands greater efficiency, security and regulatory compliance, the need for an effective IAM process has never been more pressing.
Volume 5, 2011
by Rafael Etges, CISA, CRISC, CIPP/C, CISSP, and Anderson Ruysam, CRISC, CISSP, ITIL
What are the governance elements required to ensure the success of an IDM deployment in a complex enterprise environment? What is the bottom-line impact of having—or not having—these elements in place?
Volume 2, 2010
by S. Anantha Sayana, CISA, CISM, CIA
Volume 2, 2010
by Yin Pan, Ph.D., Bill Stackpole and Luther Troell, Ph.D.

Wikis: 2 total

Blog Posts: 2 total

Must be a Topic member to view blog posts
On March 1st,  I was invited to speak at the CampIT conference on Enterprise Risk/Security Management at Rosemont Convention Center. Before me there were two speakers. The first presenter spent an hour presenting the story from the trenches of technolog...
Posted By : appolloconsulting | 2 comments
Traditionally, each software application is developed to maintain and manage the identity and the related permission information within it. As more and more such applications gets deployed, user provisioning and managing access control could soon be a nig...
Posted By : Kannan | 0 comments