Show Summary Details
Chapter 23: Historical Challenge of Managing Identity: Complexity To Protect, First Modernise Identity: Risk Beyond IT – Ensuring Business Engagement Modernising the IAM Estate: An Emerging Architecture Zero Trust Architecture ZTA Foundations ZTA Performance: Secure the Data Plane How ZTA Informs Cybersecurity Data Architecture From Data Points to ‘Profiles’: Emerging IAM Data Architecture Beyond Identity: IAM Data Architecture to Ubiquitous Visibility Across the Cyber Risk Profile ...
Primacy of ‘Identity’ Data Points
Cyber Security: Law and Guidance
- Author:
- Helen Wong
- Publisher:
- Bloomsbury Professional
- Edition:
- Second edition
- Publication Date:
- 2025
If you would like to access this content, but you are not currently a subscriber, please sign up for a free trial here. If you already subscribe to this service please login here.