When we look through the Loom Lens, we see the connective fabric that brings together secure tactical planning and strategy, placing the “Eyes of the User” at the starting point. Let’s take a closer look at one of these users by introducing you to Marketing Mary.
Hello everyone, I am Mary. It is a pleasure to meet you. I don’t have much time to go into detail due to my hectic schedule but here is a quick glimpse of my day in the life of a Marketing professional. Throughout the day I’m constantly multi-tasking by checking and sending emails to B2B partners and vendors, meetings, campaign & strategic planning, content creation, analytics reviews, and collaborating with the sales teams.
My smartphone and company sanctioned laptop are always by my side. These devices enable me to schedule and plan, shuffle things around, and prioritize my time to ensure deadlines are met, campaigns are effective, and brand messaging is clear and consistent.
Now think about Mary’s role, the people who have the same responsibilities at your organization, and the complexities associated with not just one user but a multitude of users who are accessing the same applications, different applications based on their job function and department, what is or is not permissible, how to ensure optimal productivity while balancing this out with proper, relevant ZeroTrust principles and security controls.
The foundational layer is Governance. Governance sets forth the organizational culture and aligns with business goals, objectives, and regulatory compliance mandates. Within an organization, the supporting pillars of Governance often includes the C-Suite & Board of Directors / Advisory Board, Risk Management, and Cyber / Information Security. Each of these teams play an integral part in fortifying:
The company brand
Identifying, managing, and reducing risks
New revenue streams
Protecting & securing revenue streams, users, assets, applications, and data
The overarching umbrella of Governance drives the necessity for Policies (e.g., Acceptable Use, Password Mgmt., Access Mgmt incl. ZeroTrust), Industry Standards (e.g., NIST, ISO, HIPAA, PCI, CCPA, GDPR, CIS), and Procedures (e.g. Identity Governance, Access Management, Strong Authentication, Privileged Access Management). By defining and documenting Policies, Standards, and Procedures it enables cultural and business – departmental alignment, which makes it easier to gauge risks and agree on rationalizing and justifying costs and resources (e.g., personnel, contractors) for implementing the supporting access, strong authentication, and governance controls. In the world of Identity Governance, this includes HR & Legal standards & processes for onboarding & offboarding employees, contractors, and vendors, integration of HR Systems of Records / Sources of Truth (e.g., Workday, Bamboo, ADP) into Identity Governance solutions for maintaining a centralized identity repository, automated provisioning and de-provisioning of identities, identifying hidden and orphan accounts, auditing and monitoring excessive privileges and escalated permissions, assigning and administering Just – In – Time (JIT) permissions and privileges, application reviews and attestations, and producing Metrics and Reports based on tangible, accurate data (e.g., KPIs, KRIs, KBIs).
This is where Loom comes into play. We apply a proven, industry framework methodology and approach, corral disparate information, coordinate & communicate amongst the various teams and stakeholders, and deliver a diagnostic baseline analysis that brings clarity into addressing and prioritizing remediation.
Sign up to watch a video from our experts discussing the beginning stages of Marketing Mary's journey with Loom!
Comments