Security teams handling Identity and access management (IAM) are hampered by dirty data and need data-cleansing help from a chief data officer, according to TechVision Research. To learn more, download the free report “Getting Your Identity Data Right.” Security teams handling Identity and access management (IAM) are hampered by dirty data and need management help from a chief data officer, according to a new report by TechVision Research.IAM is typically defined as a “security discipline that enables the right individuals to access the right resources at the right times for the right reasons.” But identity data is riddled with errors, which ultimately raise security and privacy risks, the report says.The problems include multiple versions of employee names and titles in various systems — and even “ghost” employees. “We find a plethora of identity data challenges, including multiple authoritative sources of data, inconsistent data, redundant data, old data and misclassification of data,” the report says.For example, companies may think they’ve deleted data about a former employee only to find that it was replicated in other systems. “Scores of companies are left with the ghost legacy of former employees that still have access rights — even people they fired for cause,” says Gary Rowe, CEO and principal consulting analyst at TechVision Research. “Most identity teams have little understanding of data architecture, data management and data governance and it is time that identity management embraces these disciplines,” the report says. Fortunately, the rise of the chief data officer role will provide more C-suite attention to issues of data quality and governance.The report also discusses: The “siloization of data” and the need to synchronize across silosThe value of “virtual directory services”How identity data’s authenticity decays over timeConstructing an Identity Data ServiceDownload this free report from TechVision Research: “Getting Your Identity Data Right” download Getting Your Identity Data RightTechVision Research Related content news Multibillion-dollar cybersecurity training market fails to fix the supply-demand imbalance Despite money pouring into programs around the world, training organizations have not managed to ensure employment for professionals, while entry-level professionals are finding it hard to land a job By Samira Sarraf Oct 02, 2023 6 mins CSO and CISO CSO and CISO CSO and CISO news Royal family’s website suffers Russia-linked cyberattack Pro-Russian hacker group KillNet took responsibility for the attack days after King Charles condemned the invasion of Ukraine. By Michael Hill Oct 02, 2023 2 mins DDoS Cyberattacks feature 10 things you should know about navigating the dark web A lot can be found in the shadows of the internet from sensitive stolen data to attack tools for sale, the dark web is a trove of risks for enterprises. Here are a few things to know and navigate safely. By Rosalyn Page Oct 02, 2023 13 mins Cybercrime Security news ShadowSyndicate Cybercrime gang has used 7 ransomware families over the past year Researchers from Group-IB believe it's likely the group is an independent affiliate working for multiple ransomware-as-a-service operations By Lucian Constantin Oct 02, 2023 4 mins Hacker Groups Ransomware Cybercrime Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe