Artificial Intelligence & Machine Learning , Blockchain & Cryptocurrency , COVID-19

The Components of an Effective IAM Strategy for the Cloud

Andrew Koh of Habib Bank Describes Essential Elements
<
Andrew Koh, DGM & Regional Lead-Risk, Habib Bank

An identity and access management strategy for a hybrid cloud environment should include single sign-on as well as multifactor authentication, says Andrew Koh, deputy general manager and regional lead-Risk at Habib Bank Ltd. in Singapore.

See Also: The State of Organizations' Security Posture as of Q1 2018

In a video interview with Information Security Media Group, Koh discusses how enterprises are leveraging the edge computing model to build an integrated platform for applying IAM for the hybrid cloud.

Koh offers insights on:

  • Taking a risk-based authentication approach for a secure remote workforce;
  • Leveraging blockchain to secure user access and data;
  • Using a “zero trust” model as part of IAM strategy.

Koh handles security and risk management functions at Habib Bank. He has three decades of professional experience in audit, banking, capital markets, payment, and risk management, working with regulators on policies and industry best practices. He has been a frequent speaker at industry events and has made presentations to boards, C-suite executives, and industry experts from central banks, government agencies, financial institutions, and major corporations.


About the Author

Geetha Nandikotkur

Geetha Nandikotkur

Vice President - Conferences, Asia, Middle East and Africa, ISMG

Nandikotkur is an award-winning journalist with over 20 years of experience in newspapers, audiovisual media, magazines and research. She has an understanding of technology and business journalism and has moderated several roundtables and conferences, in addition to leading mentoring programs for the IT community. Prior to joining ISMG, Nandikotkur worked for 9.9 Media as a group editor for CIO & Leader, IT Next and CSO Forum.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.in, you agree to our use of cookies.