Tag Archives: High Risk User

How to identify and measure IT access risks

IT Risk Identification with Access Intelligence – Why you can’t do without it

Before access risks can be avoided, reduced or managed, they must first be identified. While this may seem trivial, it is a complex task in terms of permission management. Detecting and assessing risks among the enormous amounts of data that continuously accrue in the access management environment is a lot like finding the proverbial needle in the haystack. With a growing number of users, roles and IT systems – all of which must be granted permissions – the sheer number of risk opportunities rises exponentially.

A company with 5,000 employees and only 50 IT systems with ten permission groups each, for example, has over 2.5 million permission-granting possibilities, each of which may represent a high or low risk for the company. In light of this, the task of identifying all the existing risks from these permissions, assessing their effects and defining appropriate measures seems hopeless.

Tags: |
Stefanie Pfau
Product Manager IAM Stefanie has been working in the IT sector for 15 years and started as project manager for complex software projects for hospitals. From these very complex but more standardized healthcare projects, she moved to the retail industry with more international software projects meeting different international legal requirements and the fufilment of customer specific software solutions based on standard software. With her quick uptake, above average commitment, and analytical ability to see through complex situations, she took over responsibility for the technical product management at Beta Systems. With her proven track record and her excellent attention to detail and follow through she is a very strong asset for our IAM strategy development. Stefanie understands core business objectives, and translates them into excellent product solutions by creating detailed functional specifications for use by both technical and non-technical readers.

Planning an Access Risk Management System

Sample of Analysis

Sample of Analysis

Managing access permissions is an increasingly important part of successful risk management. The potential risk to corporate IT increases with every access authorization and every user account. When people dealing with risk management include permission structures in their work, they can significantly reduce IT risk potential and therefore strategic and operational risk too.

So what do you need to consider when planning, implementing and deploying an access risk management system.

Tags: | |
Niels von der Hude
Born in 1968, he received his diploma in electronic engineering at TechnischeUnversität Berlin in 1993. In 2000, Niels von der Hude passed the 'General Management Programme' at INSEAD. After ten years of work in telecommuncation business, where he acted as a management consultant and as a corporate investment manager, Niels von der Hude entered Beta Systems in 2003.