Show Summary Details

Primacy of ‘Identity’ Data Points

Cyber Security: Law and Guidance

Author:
Helen Wong
Publisher:
Bloomsbury Professional
Edition:
Second edition
Publication Date:
2025
Chapter 23: Historical Challenge of Managing Identity: Complexity To Protect, First Modernise Identity: Risk Beyond IT – Ensuring Business Engagement Modernising the IAM Estate: An Emerging Architecture Zero Trust Architecture ZTA Foundations ZTA Performance: Secure the Data Plane How ZTA Informs Cybersecurity Data Architecture From Data Points to ‘Profiles’: Emerging IAM Data Architecture Beyond Identity: IAM Data Architecture to Ubiquitous Visibility Across the Cyber Risk Profile ...

If you would like to access this content, but you are not currently a subscriber, please sign up for a free trial here. If you already subscribe to this service please login here.