Page 136 - Cyber Defense eMagazine June 2024
P. 136
5.) Politics
Tale as old as time: a new executive comes in and brings their preferred team and vendors with them.
This isn’t always a bad thing, but consideration must be given to how this fits into an existing
organizational framework. Ripping and replacing for the sake of making your mark can lead to frustrated
employees and unproductive processes that equate to more headaches than results. Be intentional about
the solutions you choose—especially identity ones, which touch every aspect and person involved with
your business.
The failure of IGA programs can be attributed to a variety of factors. Without proper alignment with
business objectives, ineffective implementation, and a lack of immediate value-add, IGA initiatives will
continue struggling to gain traction and deliver the intended benefits. To address these challenges and
maximize the success of identity programs, organizations must get real about their expectations, plan
strategically, be adaptable to change, and go one step at a time. By addressing the common IGA
missteps, organizations can enhance their security posture, streamline compliance efforts, and unlock
the full potential of their IGA investments.
About the Author
Jackson is the CSO at Clear Skye. He began his identity
management career as an early employee at Toronto-based
Zoomit Corp., the pioneer in the development of meta-directory
products who Microsoft acquired in 1999. While at Microsoft, he
was responsible for product planning and marketing around
Microsoft’s identity & access management products including
Active Directory and Microsoft Identity Manager. Jackson has held
various senior product management and marketing roles since
Microsoft including Vintela, Quest Software, Dell, One Identity, and
Forcepoint. He studied computer science at the University of
Ottawa, Canada. Jackson can be reached online at
[email protected], LinkedIn, Twitter, and at our company
website https://clearskye.com/
Cyber Defense eMagazine – June 2024 Edition 136
Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.