Cyber incidents for the thrill of it?
It’s hard to make the topic of IT operations a stirring drinks & dinner conversation — with all the technical jargon, acronyms, and mind-numbing regulations. But talking about the ‘adventure’ of dealing with a cybersecurity incident — now that’s thrilling, high-suspense drama.
.png)
A note from Oleria CEO, Jim Alkove:
Leaders I meet often remind me why I’m passionate about building a world where every organization is trusted to protect the data of all people. Phil Quade is one of those leaders. With decades in operations and administration at the NSA, Phil brings unique insight on risks that organizations and governments alike are navigating. He’s always willing to share his knowledge — and often puts things into sharp new perspective.
During a recent conversation, Phil and I talked through an analogy that’s both entertaining and deeply relevant to identity security. I asked him to share his perspective in this newsletter, and I think you’ll find his words both enlightening and thought-provoking.
Attention thrill seekers
Who needs drinks when you can instead have the excitement of a cybersecurity incident?
It’s hard to make the topic of IT operations a stirring drinks & dinner conversation — with all the technical jargon, acronyms, and mind-numbing regulations. But talking about the ‘adventure’ of dealing with a cybersecurity incident — now that’s thrilling, high-suspense drama.
In fact, if you like living on the edge, there’s a very sure way to keep the cybersecurity excitement high: neglect your identity governance, just for the thrill of it.
A Game of Thrones drama
Imagine your company as a medieval castle (a very original analogy, I know): You've got your sturdy walls, a right-sized moat, and your trusty knights.
Identity Governance is like the castle’s gatekeeper, making sure only the right people get access to the good stuff. And neglecting Identity Governance is like removing that gatekeeper — it makes all of those defenses pretty worthless. What good are they if you let just anyone wander in and out?
A primer on Identity Governance
Jumping out of the castle and back to the real world, Identity Governance in IT is the process of managing and controlling digital identities within an organization. It's about knowing who has access to what and making sure that access is appropriate and secure.
Choose your own adventure: Two paths to implement Identity Governance
If I were talking to a dinner table of sober-eyed, cybersecurity incident-scared peers, I’d pass along a few tips on how to effectively implement Identity Governance. But to make it less preachy, I’d probably note that they have a choice:
While Identity Governance may not be the most exciting dinner topic, it's essential if you want to avoid ‘the thrill of the breach’. But if you’re tempted to roll the dice by not getting control of your Identity attack surface, brace yourself for some excitement.
More from Phil Quade
Want to hear more from Phil Quade? Earlier this year, he authored an article titled, “Why I am betting on Oleria as the future of identity security”.
.png)