Checklist for Building an Identity-Centric Cybersecurity Framework

Robust digital identity management is a key part of an effective cybersecurity program. An identity-centric approach to cybersecurity can help protect against authentication threats when attackers catch up with technology, and it can also address convenience issues and mitigate insider risks. In this checklist, derived from our in-depth article series on digital identity management in a post-pandemic world, we provide a framework to assist with building an identity-centric cybersecurity program. See our two-part series on digital identity management in a post-pandemic world: “A Framework for Identity-Centric Cybersecurity” (Mar. 24, 2021); “SolarWinds, Zero Trust and the Challenges Ahead” (Mar. 17, 2021).

To read the full article

Continue reading your article with a CSLR subscription.