Authored by Katherine Cola Millicom is a leading provider of cable, mobile and high-speed broadband services throughout Latin America. John Masserini, Global Chief Information Security Officer at Millicom, recently sat down with SailPoint to explain why identity is central to his organization’s overall security strategy. While initially driven by compliance requirements, ...
SailPoint
Authored by Stephen Bradford, SVP EMEA, SailPoint It was in GoldenEye that ‘M’ (a very modern incarnation played by Judi Dench), derided Bond as a ‘relic of the Cold War’ and a ‘dinosaur.’ Her sobriquet of Bond is likely something he wore with pride but let’s face it—the Bond incarnations of Connery, Moore, Lazenby, and Craig have not kept up with their computer skills. T...
Authored by: Casey Herman, PwC Partner, ESG Leader; Brad Bauch, PwC Principal, Advisory; and David Manks, SailPoint Technology Alliances & Partner Marketing If there was any doubt about the importance of cybersecurity in the utility industry, one needs simply to look at the recent news. Already this year, there have been two major breaking stories: In May, a cyberattack sh...
Outside of our comfort zone is a place that most of us don’t like to be. That isn’t the case for SailPoint’s Mariah Finleon, Director of Inside Sales. In this Women in Identity blog, we sit down with Mariah and learn about her journey to identity security and who helped her get here. Tell us a little about yourself and your career journey. My career journey began in the r...
As technology professionals, it’s all too easy to become too tightly focused on the technology at the expense of the bigger picture — technology is simply a means to an end. That end for Roy Sookhoo, CIO at the University of New Mexico Health Sciences Center, is to improve people’s lives in some way and make the organization more resilient, agile, and efficient. Sookhoo st...
If you’ve ever used a swiss army knife, you know it has many different functions. That’s like SailPoint’s Kaylee Reardon, inside account executive, strategic enterprise, she can do it all. With a background in non-profit and software industries, she honed her skills in sales, fundraising, recruiting, hiring, training, client relations, account management and event planning....
Authored by: Matthew Radcliffe Did you know there were more than 29 million healthcare records breached in 2020, and the second-leading cause of those breaches was unauthorized access?[1] If the last year has taught us anything, it’s that life can be unpredictable and sometimes we are forced to change — rapidly. So how does one of the most regulated industries embrace gro...
Authored by: Jody Paterson Now available within IdentityNow, SailPoint’s Access Risk Management enables organizations to get granular visibility into potential access risks within complex ERP systems such as SAP — even before access is approved and provisioned. One of the biggest challenges facing any enterprise is risk management, particularly managing risks associated w...
Authored by: Lori Robinson It’s inevitable that you will run across a situation where the cloud access configured in your environments is misconfigured or over provisioned. This is to be expected due to the high velocity, large volume, and wide variety of changes that are constantly taking place in cloud environments. Even with the most carefully crafted governance framewo...
Authored by: Eric Yuan, Vice President, Global Strategic Partners, SailPoint Detecting risk in an organization is harder than ever before. With a mostly virtual workforce accessing, creating, and storing company and customer confidential information both locally and in cloud storage solutions, the threat surface is more expansive than ever before. Sure, IT has risk monitor...