Identity and Access Management, or IAM, is the foundation of modern security and is an important part of a mature cybersecurity program. Many important conversations surrounding IAM started last year with the onset of the pandemic, and many foundational pieces of IAM have been put into place for organizations that may have never given cybersecurity a second thought.

We again sat down with Chris Vermilya following our previous interview that covered topics illuminating the basic principles of Identity and Access Management, like the Four Pillars of IAM. This time around, we dove into other areas, like how IAM plays into a Zero Trust Framework, re-thinking how IAM services are managed, the impact of artificial intelligence/machine learning, and more. Check out all of the clips from our interview below.

What is IAM?

At its core, Identity and Access Management (IAM) is the governance of identities and what access they have. Let’s start by reviewing Fishtech’s unique approach to IAM and the four pillars that make up a solid IAM program.

 

Is IAM the Foundation of Modern Security?

Traditional perimeters are obsolete, but how should organizations view their overall IAM security model? Hear Chris Vermilya explain why the “castle and moat” model is dead and exactly how and why a zero-trust approach shows us the way.

 

Getting Started with IAM

Organizations often feel overwhelmed knowing exactly how to start their program or next steps to maturity, but our trusted advisors will help you understand what approach you should take based on your business objectives and risk landscape. Chris describes many common approaches below.

 

How Does IAM Play Into a Zero Trust Framework

Let’s dive deeper into what Zero Trust really means, and more importantly how it works inside an organization’s environment – both from an internal as well as an external identity perspective.

 

Should IAM Be Managed as a Service?

The hypergrowth of the security product landscape has pushed the necessity of as-a-service models which enable organizations to implement, validate, and even automate their tech stack while making the absolute most of every dollar spent. What are best practices around identity solutions from a security-as-a-service perspective?

 

How Does Artificial Intelligence and Machine Learning Impact IAM?

By now most people have realized that AI and Machine Learning are often buzzwords used to hype a product or solution. At the end of the day, what practical value do these solutions drive to an organization? Often only as much as the data that’s available and the processes around how that data informs critical decision-making. Learn more from Chris on how future-focused organizations are actually leveraging AI and Machine Learning in very practical ways.

 

Cross-Functional Cybersecurity Solutions

IAM doesn’t exist in a vacuum but impacts so many different areas of the modern business and is a critical foundation for so many other areas of a mature cybersecurity program. Whether dealing with cloud security, governance and compliance, detection and response, or even the basics of log management, you’ll find identity as a core component and data stream. Chris explains some of the exciting ways these joint solutions are impacting our clients to streamline and automate their programs.

 

Join the IAM Team

We are passionate about leading organizations to a more secure future, realizing that we are aiding organizations by protecting far more than just data alone, but the systems behind that data and most of all, the people those systems impact. Whether it’s in healthcare, finance, energy, retail, or any other sector, robust cybersecurity programs matter to protect real people’s lives and livelihoods. If you share our passion, check out our careers page for our latest open positions and apply today!