Digital Identity , Governance & Risk Management , Identity & Access Management

CIAM: Balancing Personalization and Privacy

Reflections on Roundtable Discussion Hosted by Ping Identity and IDMWORKS
Ping Identity's Richard Bird (left), and Gray Mitchell of IDMWORKS

Identity and access management for the workforce? Cybersecurity leaders are all over that. But what about customer IAM? There's plenty of room to grow there, judging by Dallas roundtable discussion featuring Richard Bird of Ping Identity and Gray Mitchell of IDMWORKS.

See Also: The Global State of Online Digital Trust

In a post-roundtable video interview with Information Security Media Group's Tom Field, Bird and Mitchell discuss:

  • The state of CIAM;
  • How the Dallas discussion validated their views on CIAM maturity;
  • Why this is a hot topic for cybersecurity leaders to be discussion now.

Bird is a cybersecurity veteran, a former chief information security officer and a former chief information officer. An internationally recognized data privacy and identity-centric security expert and global speaker, he leverages his diverse career experiences as a strategic advisor, solutions provider and former global head of identity for JP Morgan Chase's consumer businesses to challenge current notions about cybersecurity.

For over two decades, Mitchell, has pioneered innovative security solutions to solve complex business challenges in his role as a CISO in heavily regulated industries including Fortune 100 Healthcare Companies, State Government Agencies, and Educational Organizations. Gray currently serves as IDMWORKS' CISO and VP of Advisory services.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.