Consider Solutions: Identity and Access Governance Evolves – Best Practices for Management Consideration

The discipline of what we today call Identity Access Governance (IAG), comprising of the management of identities, the control of access to these identities, to assets and the governance thereof, has been on the CIO agenda for 15 years.

In an industry that is renowned for acronyms, these concepts have achieved outstanding success in garnering more than we have seen for any other domain: IDM, IDG, IAM, IMG and IAG to name a few. This paper will concentrate on the term IAG as defined above but

Only users who have a paid subscription or are part of a corporate subscription are able to print or copy content.

To access these options, along with all other subscription benefits, please contact [email protected] or view our subscription options here: http://subscriptions.risk.net/subscribe

You are currently unable to copy this content. Please contact [email protected] to find out more.

To continue reading...

You need to sign in to use this feature. If you don’t have a RiskTech Forum account, please register for a trial.

Sign in
You are currently on corporate access.

To use this feature you will need an individual account. If you have one already please sign in.

Sign in.

Alternatively you can request an individual account here: