Tag - Management

Securing GenAI with Non-Human Identity Management

Originally published by Oasis Security. Written by Joel McKown, Solutions Engineer, Oasis Security. There are many inevitabilities in technology, among them is that rapid innovation will introduce unique risks and 3 letter acronyms will abide. Generative AI conversations have become top of mind, as business races to find the most value from a new technological arena...

National Academy of Public Administration Hosts Forum on Risk Management for Shared Service Providers

National Academy of Public Administration Hosts Forum on Risk Management for Shared Service Providers Post Date: May 05, 2016 WASHINGTON, D.C. – The National Academy of Public Administration (the Academy), in partnership with Ernst & Young LLP (EY), this week hosted a forum on Shared Service Providers and the Risks That You Should Be Thinking About—a Conversation...

Transition 2016 Op-Ed: Striving for Excellence in Federal Management

Transition 2016 Op-Ed: Striving for Excellence in Federal Management Post Date: July 12, 2016 In less than four months, the Presidential campaigns will end and speculation will immediately focus on who will staff the new Administration. But management issues? They’re unlikely to get much attention. That is, until they bite, as every Administration discovers, to its...

National Academy of Public Administration to Release Newest Prune Book Nov. 16, 2016 – Top 40 Toughest Management Jobs in Government

National Academy of Public Administration to Release Newest Prune Book Nov. 16, 2016 – Top 40 Toughest Management Jobs in Government Post Date: November 01, 2016 WASHINGTON, D.C. – The National Academy of Public Administration (the Academy), in partnership with Ernst & Young LLP, will host a launch event on Wednesday, November 16th, to mark the release of...

Monetary Authority of Singapore moves to strengthen technology risk management

The Monetary Authority of Singapore is eyeing to strengthen its capability to handle technology risk by putting in place measures that would require financial institutions to develop operational resilience. The plan is to expand its Technology Risk Management (TRM) Guidelines issued in 2013 and the Business Continuity Management (BCM) Guidelines issued in 2003. MAS...

NAPA President and CEO Terry Gerton’s Testimony Before the U.S.& Senate Committee on Homeland Security and Governmental Affairs Subcommittee on Regulatory Affairs and Federal Management

NAPA President and CEO Terry Gerton’s Testimony Before the U.S.& Senate Committee on Homeland Security and Governmental Affairs Subcommittee on Regulatory Affairs and Federal Management Post Date: April 06, 2017 Chairman Lankford, Ranking Member Heitkamp, and members of the Subcommittee, I appreciate the opportunity to speak before this committee today...

What’s Broken with Identity Management?

Originally published by Oasis Security. Written by Danny Brickman, Co-founder & CEO, Oasis Security. Identity management is a critical component of enterprise security. Identities are the key construct through which we control how authorized entities (individuals, software or devices) can access data and perform actions. Historically, human identities have the...

Defining Cloud Key Management: 7 Essential Terms

Written by Megan Theimer, Content Program Specialist, CSA. In the realm of cloud security, understanding key management is paramount to safeguarding sensitive data. Encryption, key generation, and access control help ensure that sensitive information remains unreadable and inaccessible to unauthorized parties. Without a thorough understanding of cloud key management...