top of page
potter707

"A Day in the Life"

Updated: Dec 10




When we look through the Loom Lens, we see the connective fabric that brings together secure tactical planning and strategy, placing the “Eyes of the User” at the starting point. Let’s take a closer look at one of these users by introducing you to Marketing Mary.


Hello everyone, I am Mary. It is a pleasure to meet you. I don’t have much time to go into detail due to my hectic schedule but here is a quick glimpse of my day in the life of a Marketing professional. Throughout the day I’m constantly multi-tasking by checking and sending emails to B2B partners and vendors, meetings, campaign & strategic planning, content creation, analytics reviews, and collaborating with the sales teams. 


My smartphone and company sanctioned laptop are always by my side. These devices enable me to schedule and plan, shuffle things around, and prioritize my time to ensure deadlines are met, campaigns are effective, and brand messaging is clear and consistent. 


Now think about Mary’s role, the people who have the same responsibilities at your organization, and the complexities associated with not just one user but a multitude of users who are accessing the same applications, different applications based on their job function and department, what is or is not permissible, how to ensure optimal productivity while balancing this out with proper, relevant ZeroTrust principles and security controls.

The foundational layer is Governance. Governance sets forth the organizational culture and aligns with business goals, objectives, and regulatory compliance mandates. Within an organization, the supporting pillars of Governance often includes the C-Suite &  Board of Directors / Advisory Board, Risk Management, and Cyber / Information Security. Each of these teams play an integral part in fortifying:


  • The company brand

  • Identifying, managing, and reducing risks

  • New revenue streams

  • Protecting & securing revenue streams, users, assets, applications, and data


The overarching umbrella of Governance drives the necessity for Policies (e.g., Acceptable Use, Password Mgmt., Access Mgmt incl. ZeroTrust), Industry Standards (e.g., NIST, ISO, HIPAA, PCI, CCPA, GDPR, CIS), and Procedures (e.g. Identity Governance, Access Management, Strong Authentication, Privileged Access Management). By defining and documenting Policies, Standards, and Procedures it enables cultural and business – departmental alignment, which makes it easier to gauge risks and agree on rationalizing and justifying costs and resources (e.g., personnel, contractors) for implementing the supporting access, strong authentication, and governance controls.  In the world of Identity Governance, this includes HR & Legal standards & processes for onboarding & offboarding employees, contractors, and vendors, integration of HR Systems of Records / Sources of Truth (e.g., Workday, Bamboo, ADP) into Identity Governance solutions for maintaining a centralized identity repository, automated provisioning and de-provisioning of identities, identifying hidden and orphan accounts, auditing and monitoring excessive privileges and escalated permissions, assigning and administering Just – In – Time (JIT) permissions and privileges, application reviews and attestations, and producing Metrics and Reports based on tangible, accurate data (e.g., KPIs, KRIs, KBIs). 


This is where Loom comes into play. We apply a proven, industry framework methodology and approach, corral disparate information, coordinate & communicate amongst the various teams and stakeholders, and deliver a diagnostic baseline analysis that brings clarity into addressing and prioritizing remediation.


Sign up to watch a video from our experts discussing the beginning stages of Marketing Mary's journey with Loom!

20 views0 comments

Recent Posts

See All

Comments


bottom of page