Redefining IAM Strategy for the CloudIndustrial Kuwait Bank's Rushdhi Mohammad on Managing Digital Identities
In defining an IAM strategy for the cloud, CISOs need to automate the processes of provisioning, de-provisioning, monitoring and auditing as well as implementing federated access and API integration, says Rushdhi Mohammad, information security officer at the Industrial Bank of Kuwait.
See Also: Top 50 Security Threats
IAM must be aligned with business objectives and provide robust integration and automation options for user access, Mohammad says in a video interview with Information Security Media Group.
In this interview, Mohammad offers insights on:
- Improving identity governance aligned with PAM strategy;
- Simplifying identity and access management for enhanced security;
- Determining how practical the single-sign-on approach is.
Mohammad is an information security officer at the Industrial Bank of Kuwait. He has over 10 years of experience in information security consultation, evaluation, design, implementation, support, and maintenance of information security programs and controls aligned with business strategies.