Bio
Strategic professional with extensive experience in identity management (Certified Identity Access Manager). I have over 10 years of experience working to develop and deploy an advanced IAM life cycle model. Protecting at an enterprise level Capital Markets (US based) technology portfolio, with 1,000 applications and over 3.2 trillion (USD) dollars of assets.
My professional skills progressed with an IAM
industry approach,
first working on a centralized IAM warehouse, getting all the access technology onto one enterprise warehouse, (See commercial process "Logon access management -3rd party)". Next perfecting an IAM governance dashboard to measure progress and identity protection, improving certifications on average above a 98% compliance score, developing a process design based on IAM connection order, working a phased in approach to Segregation of Duty (SOD), creating a second commercial process "Automatic revocation", and a final metric improvement on removing actionable access items from the risk horizon. The last action reduced the technology WIP items from an industry average of 12-15% to .05%.
The entire model mentioned above, once deployed also protects from a Cyber Security standpoint (Third Party Hacking) and frees up resources to work on risks coming from outside the firewall. I have worked with major US Corporations & Financial Services companies providing IAM Security protection and ease of automation. In concert with IAM, I ran for five years an ethical hacking governance program to strength the applications that I managed in the Identity Management office. I currently work as a Principal IAM Consultant for "Fortress365 Consulting" Massachusetts based.
Authored Articles
Filter by label (Content by label) | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Recent updates | ||||||||
---|---|---|---|---|---|---|---|---|
|