Media:
English
Navigation:
English
Please enter your search term
Sign In
Queue
Favorites
Cloud TV
FreeAir.tv Channels
My Library
A-la-carte Subscriptions
History
My Account
My Devices
Earn Cash
Help
SwineCast: Regular updates and entertainment on and about the pork industry. Your Connection. At Your Convenience. (tm)
SwineCast
"It's all about the story" Stand Up Comedian Tom Shillue, (from the standup TV special Comedy Central Presents: Tom Shillue), lives up to his reputation as New York's best comic storyteller with these largely improvised monologues. These stories were performed in front of a live audience in NYC.
- Tom Shillue Live Comedy Podcast -
What happens in Las Vegas - and everywhere else. Vegas Buzz Radio features interviews with business, technology and entertainment leaders, and music from the latest and hottest indie bands.
VegasBuzzRadio.com
Listen in while Stacey and Stephen explore the wilds of the kitchen and try new cuisines!
The Hapless Gourmands
A podcast all about Japanese cartoons and comics as discussed by three self-proclaimed experts in the world of anime and manga! Plus anime news / reviews, coverage of classic anime, hentai / yaoi, and much, much more. Updated every week. We hope.
Anime World Order Podcast
Report on the U.S. employment situation with an added emphasis on staffing services activity presented by an employment and economic consultant. For an interactive movie version, complete with charts and graphs, go to www.brucesteinberg.net/monthly_employment_situation.htm
U.S. Employment Report
Hear live recordings of the songs from the Tony-nominated composer's new songbook.
The Jeff Blumenkrantz Songbook Podcast
Identity Management Series – Workflows Part 5: Wrapping Up
Training
USA
Investing & Finance
About
Discover in
Share
Playing on
This month, we focused on one of the key functionalities of identity management – workflows. Specifically, Provisioning and deprovisioning (which I abbreviate as de/provisioning) Non-employee management User and access recertification These workflows build on each other – it’s necessary to identify how access is de/provisioned before any recertification can be set up, because ultimately once [...]
Related posts:
Vacancy Management and Hierarchies Part 5: Wrapping Up
Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – HR as a Source of Record Part 5: Reliability and Accessibility
0 views
العربية (المملكة العربية السعودية) \ North America \ USA
العربية (المملكة العربية السعودية) \ Audio Books \ Bussines \ Investing & Finance
العربية (المملكة العربية السعودية) \ Video \ Training
Direct link
Playing on all devices
Most Popular
Newer Episodes
Older Episodes
Most Popular
Most Recent
Most Viewed
The Security Catalyst
In the previous segments, we focused on special-case transfers that may be hard to recognize. At the macro level, when a user transfers between HR systems, a legitimate transfer can be mistaken for a termination, leading to poor customer service (and the trouble that ensues). At the micro level, when a user transfers within a [...]
Related posts:Identity Management Series – Termination and Transfer Gotchas Part 2: Transfers Within a Department
Identity Management Series – Termination and Transfer Gotchas Part 1: Transfers and Multiple HR Systems
Identity Management Series – HR as a Source of Record Part 4: Terminations
Identity Management Series – Termination and Transfer Gotchas Part 3: Terminating Employment vs. Terminating Access
In the first segment, we looked at one extreme of transfers – a job change entailing a move between HR systems. In this segment, we’ll look at the other extreme of transfers – a job change that may fall under the HR radar. When we talked about the implications of HR as a source of [...]
Related posts:Identity Management Series – HR as a Source of Record Part 3: Transfers
Identity Management Series – Role- and Rule-Basing Part 1: Introduction
Identity Management Series – Role- and Rule-Basing Part 2: Identifying & Prioritizing Enterprise Roles
Identity Management Series – Termination and Transfer Gotchas Part 2: Transfers Within a Department
In the previous series, we started prepping for the key workflows that make an IAM implementation worth the cost and effort. Implementing workflows effectively is critical to achieving the desired value in terms of time savings and effort/cost reductions. It also gets the organization excited about IAM and makes them willing to keep maturing the [...]
Related posts:Identity Management Series – HR as a Source of Record Part 3: Transfers
Identity Management Series – HR as a Source of Record Part 1: Overview and Approach
Identity Management Series – HR as a Source of Record Part 4: Terminations
Identity Management Series – Termination and Transfer Gotchas Part 1: Transfers and Multiple HR Systems
Faced with the choice between changing one’s mind and proving that there is no need to do so, almost everyone gets busy on the proof. ~John Kenneth Galbraith We set out in January to live and explore full time in an RV. We challenged ourselves; we challenged our notions of nearly everything about modern life [...]
Related posts:Why people are not the problem and where to look (hint: grab a mirror)
Why the definition of awareness matters
How can The Catalyst Method™ benefit your efforts?
The wheels are turning… you ready to roll with the catalyst?
This month, we focused on one of the key functionalities of identity management – workflows. Specifically, Provisioning and deprovisioning (which I abbreviate as de/provisioning) Non-employee management User and access recertification These workflows build on each other – it’s necessary to identify how access is de/provisioned before any recertification can be set up, because ultimately once [...]
Related posts:Vacancy Management and Hierarchies Part 5: Wrapping Up
Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – HR as a Source of Record Part 5: Reliability and Accessibility
Identity Management Series – Workflows Part 5: Wrapping Up
This month, we focused on one of the key functionalities of identity management – workflows. Specifically, Provisioning and deprovisioning (which I abbreviate as de/provisioning) Non-employee management User and access recertification These workflows build on each other – it’s necessary to identify how access is de/provisioned before any recertification can be set up, because ultimately once [...]
Related posts:Vacancy Management and Hierarchies Part 5: Wrapping Up
Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – HR as a Source of Record Part 5: Reliability and Accessibility
Identity Management Series – Workflows Part 5: Wrapping Up
In the previous segment, we worked through the non-employee management workflows. These are a special-case of user recertification and relatively less complex, making them a good place to start. Having built some experience and achieved a quick-win, we’ll now move on to discuss the full user and access recertification workflows. This has become a key [...]
Related posts:Identity Management Series – Role- and Rule-Basing Part 1: Introduction
Identity Management Series – Role- and Rule-Basing Part 4: Documentation and Approval
Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – Workflows Part 4: User/access recertification
In the previous segment, we worked through the non-employee management workflows. These are a special-case of user recertification and relatively less complex, making them a good place to start. Having built some experience and achieved a quick-win, we’ll now move on to discuss the full user and access recertification workflows. This has become a key [...]
Related posts:Identity Management Series – Role- and Rule-Basing Part 1: Introduction
Identity Management Series – Role- and Rule-Basing Part 4: Documentation and Approval
Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – Workflows Part 4: User/access recertification
In the previous segment, we worked through the de/provisioning workflows. These are foundational to the non-employee management workflows in that a key objective of the non-employee management workflows is to terminate access when the non-employee departs. Without the de/provisioning workflows to trigger manual or automated tasks for access removal, the timely knowledge of a non-employee’s [...]
Related posts:Identity Management Series – Workflows Part 2: Provisioning and Deprovisioning
Identity Management Series – Workflows Part 1: Introduction
Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – Workflows Part 3: Non-Employee Management
In the previous segment, we worked through the de/provisioning workflows. These are foundational to the non-employee management workflows in that a key objective of the non-employee management workflows is to terminate access when the non-employee departs. Without the de/provisioning workflows to trigger manual or automated tasks for access removal, the timely knowledge of a non-employee’s [...]
Related posts:Identity Management Series – Workflows Part 2: Provisioning and Deprovisioning
Identity Management Series – Workflows Part 1: Introduction
Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – Workflows Part 3: Non-Employee Management
In this month’s Introduction, three workflow sets were introduced: Provisioning and deprovisioning (which I abbreviate as de/provisioning) Non-employee management User or access recertification This segment explores the first of these, de/provisioning) De/provisioning is the most common of IAM workflows. Done right, this workflow delivers tremendous ROI, improved audit results and improved customer satisfaction by significantly [...]
Related posts:Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – HR as a Source of Record Part 2: New Hires
Identity Management Series – Role- and Rule-Basing Part 3: Designing and Testing IT Roles
Identity Management Series – Workflows Part 2: Provisioning and Deprovisioning
In this month’s Introduction, three workflow sets were introduced: Provisioning and deprovisioning (which I abbreviate as de/provisioning) Non-employee management User or access recertification This segment explores the first of these, de/provisioning) De/provisioning is the most common of IAM workflows. Done right, this workflow delivers tremendous ROI, improved audit results and improved customer satisfaction by significantly [...]
Related posts:Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – HR as a Source of Record Part 2: New Hires
Identity Management Series – Role- and Rule-Basing Part 3: Designing and Testing IT Roles
Identity Management Series – Workflows Part 2: Provisioning and Deprovisioning
We started developing workflows in last month’s activity to manage vacancies. Relatively speaking, vacancy management workflows are comparatively simple and provide business-relevant quick-wins, which give credence to the IAM program. Since a full IAM implementation is typically a multi-year process, being able to point to tangible benefits along the way (other than, “hey – check [...]
Related posts:Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – Role- and Rule-Basing Part 1: Introduction
Identity Management Series – HR as a Source of Record Part 2: New Hires
Identity Management Series – Workflows Part 1: Introduction
We started developing workflows in last month’s activity to manage vacancies. Relatively speaking, vacancy management workflows are comparatively simple and provide business-relevant quick-wins, which give credence to the IAM program. Since a full IAM implementation is typically a multi-year process, being able to point to tangible benefits along the way (other than, “hey – check [...]
Related posts:Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – Role- and Rule-Basing Part 1: Introduction
Identity Management Series – HR as a Source of Record Part 2: New Hires
Identity Management Series – Workflows Part 1: Introduction
What can grocery-shopping carts teach us about building awareness and influencing behavior change? Turns out perhaps more than imagined. During a recent hotel stay, I took a trip to a local grocery store to buy some snacks. I pulled into the lot, parked and headed to the store. Since I only needed a few items, [...]
Related posts:Why the definition of awareness matters
RV Adventure inspired Awareness that Works™
Into the Breach – Audio Series – Chapter 9 (Extending the Conversation: Rewards Beyond Protecting Information)
What a shopping carts reveals about awareness
What can grocery-shopping carts teach us about building awareness and influencing behavior change? Turns out perhaps more than imagined. During a recent hotel stay, I took a trip to a local grocery store to buy some snacks. I pulled into the lot, parked and headed to the store. Since I only needed a few items, [...]
Related posts:Why the definition of awareness matters
RV Adventure inspired Awareness that Works™
Into the Breach – Audio Series – Chapter 9 (Extending the Conversation: Rewards Beyond Protecting Information)
What a shopping carts reveals about awareness
This month we focused on vacancy management, shifting from the functions of identity manager to role manager. Vacancy management is difficult to control manually – in many cases an approval or ownership function is a minor part of someone’s job, so the task of finding a replacement when there is a transfer or termination often [...]
Related posts:Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Vacancy Management and Hierarchies Part 4: Cost Center Ownership
Vacancy Management and Hierarchies Part 3: Data/Access Ownership
Vacancy Management and Hierarchies Part 5: Wrapping Up
This month we focused on vacancy management, shifting from the functions of identity manager to role manager. Vacancy management is difficult to control manually – in many cases an approval or ownership function is a minor part of someone’s job, so the task of finding a replacement when there is a transfer or termination often [...]
Related posts:Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Vacancy Management and Hierarchies Part 4: Cost Center Ownership
Vacancy Management and Hierarchies Part 3: Data/Access Ownership
Vacancy Management and Hierarchies Part 5: Wrapping Up
I once talked to a finance manager and asked her why her group couldn’t produce an accurate list of cost center owners. Her response was simple, “I would love to have an updated list, but no one ever tells me when there’s a change, so I have no way of maintaining a list.” As with [...]
Related posts:Vacancy Management and Hierarchies Part 3: Data/Access Ownership
Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Vacancy Management and Hierarchies Part 2: Line Management Hierarchy
Vacancy Management and Hierarchies Part 4: Cost Center Ownership
I once talked to a finance manager and asked her why her group couldn’t produce an accurate list of cost center owners. Her response was simple, “I would love to have an updated list, but no one ever tells me when there’s a change, so I have no way of maintaining a list.” As with [...]
Related posts:Vacancy Management and Hierarchies Part 3: Data/Access Ownership
Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Vacancy Management and Hierarchies Part 2: Line Management Hierarchy
Vacancy Management and Hierarchies Part 4: Cost Center Ownership
In Chapter 6 of Into the Breach (click here to listen to the audio book version of the chapter), I shared a method I use to effectively assess people, information and risk – in their own context and with a personal connection. That success led to the creation of The Catalyst Method™ — a powerful [...]
Related posts:Into the Breach – Audio Series – Chapter 7 (Putting the Strategy to Work: A Pilot)
Into the Breach – Audio Series – Chapter 8 (Measuring Success)
How can The Catalyst Method™ benefit your efforts?
1
2
3
4
5
6
Next
Total 113
Show More
The Security Catalyst
10/14/2010
Feedback
please wait...