Articles by Jim
-
Digital Supply Chain Risks Require Board Oversight
Digital Supply Chain Risks Require Board Oversight
By Jim Routh
Activity
-
Digital Identity in the Cloud...isn't that what enterprises need more of? 😉
Digital Identity in the Cloud...isn't that what enterprises need more of? 😉
Shared by Jim Routh
-
After 31 years at Citi, I am now retired
After 31 years at Citi, I am now retired
Liked by Jim Routh
-
#InfoSec tip of the day - Board Governance Focus: Ensure cybersecurity is a regular agenda item in board meetings to discuss strategic initiatives…
#InfoSec tip of the day - Board Governance Focus: Ensure cybersecurity is a regular agenda item in board meetings to discuss strategic initiatives…
Liked by Jim Routh
Licenses & Certifications
-
CSSLP
IC2
Issued -
CISM
ISACA
Issued Expires
Volunteer Experience
Publications
-
Identity as a First Line of Defense
IDS Alliance
Identity has evolved as a primary line of defense for cyber security and data science has emerged as a foundational component of digital identity management for an enterprise. Identity and Access Management (IAM) programs tend to lurk in the shadows until something goes wrong. But enterprises now have capabilities that haven’t yet been applied to cybersecurity, and IAM within cybersecurity, fueled by data science fundamentals. Identity is being widely discussed as the next generation of the…
Identity has evolved as a primary line of defense for cyber security and data science has emerged as a foundational component of digital identity management for an enterprise. Identity and Access Management (IAM) programs tend to lurk in the shadows until something goes wrong. But enterprises now have capabilities that haven’t yet been applied to cybersecurity, and IAM within cybersecurity, fueled by data science fundamentals. Identity is being widely discussed as the next generation of the perimeter as businesses transform from legacy-based, on-premises environments to cloud-hosted and Software as a Service (SaaS) applications. The design of enterprise controls has to keep pace and evolve away from on-prem to cloud-native apps, using data science to drive model-driven security.
The shift also fundamentally changed enterprise controls as on-premises IAM capabilities were substituted for access control in a cloud or SaaS deployment. However, threat actors also adjusted their approach, which meant the core IAM controls had to evolve with the tech. That saw the introduction of edge protection controls, such as using secure browsers rather than the traditional approach of virtual private network (VPN) tunnels.
The use of identity for continuous risk management and verification is well established in fraud management within financial services. But what’s new is the maturity of machine learning algorithms, which enable enterprises to apply identity in a near real-time model.
Traditionally, IAM practices relied on human labor to do the heavy lifting. Managers would have to approve employees’ access to resources, which created delays and workflow challenges and frustrated users. But a model-based approach reduces dependency on human behavior and increases reliance on models or near real-time decision-making to remove human involvement.
The benefits are significant as IAM controls improve while the productivity of the entire workforce improves. -
The Role of Cybersecurity Leaders as Educators
The Institute for Critical Infrastructure Technology
The market for cyber security talent is getting scarcer every year yet the current practices in place by enterprises reflect an employment model that has been obsolete for many years. Cyber security leaders have to adjust their recruiting practices along with their leadership skills demonstrating a solid commitment to talent development to deal with the current market conditions. Unconventional techniques can enable cyber security leaders to both attract and grow diverse talent to meet the…
The market for cyber security talent is getting scarcer every year yet the current practices in place by enterprises reflect an employment model that has been obsolete for many years. Cyber security leaders have to adjust their recruiting practices along with their leadership skills demonstrating a solid commitment to talent development to deal with the current market conditions. Unconventional techniques can enable cyber security leaders to both attract and grow diverse talent to meet the future needs of the enterprise without increasing compensation or recruiting fees. The key is to consistently demonstrate a commitment developing talent and make adjustments to roles enabling employees to have an opportunity to learn and master new skills that they choose.
Cyber leaders have to collaborate with HR professionals to apply un-conventional techniques that are essential for the current and future market conditions. Enterprises can't hire cyber security professionals when they are needed due to the constraints of the limited supply of talent. The key is to shift the paradigm to hire top, diverse talent when you find it...not necessarily when you need it. Leaders should expand their networks and consistently recruit talent for loosely defined job categories with a minimum of requirements and encourage their teams to conduct exploratory interviews designed to understand what skills the candidate wishes to master. Top talent should be offered a role that is partially designed to give them an opportunity to learn what they wish to learn.
Cyber leaders should spend 30% of their time each week on talent development for their employees. CSO/CISOs should identify the development needs for their stakeholders and design curriculums for all of their stakeholders. This demonstrates a shift toward CISOs as educators to provide a multifaceted curriculum for all stakeholders in addition to a demonstrated commitment to talent development for all employees. -
The Growing Obsolescence of Passwords
ICIT Fellows Publication
It's time for enterprises to develop an approach to eliminate the use of passwords. They served us well for 60+ years but digital consumers have too many digital assets to remember passwords for. Enterprises have an opportunity to shrink the attack surface, improve the digital experience and lower costs by implementing behavioral based authentication capabilities.
-
Successful Women In Cybersecurity Podcast
CSO Magazine & IT Security ONE2ONESummits-Reed Exibitions
-
FS-ISAC 3rd Party Software Security Working Group
FS-ISAC
White paper on 3 additive controls for a 3rd party vendor governance program specific to software security
-
Beautiful Security
O'Reilly Media
Chapter 11
Other authors -
Honors & Awards
-
CSO Hall of Fame
CSO Magazine
Award winner for CSO Hall of Fame for 2020
-
Shared Assessments Lifetime Achievement Award
Shared Assessments
Honorees recognized for the contribution to cyber security resiliency over the course of their professional careers
-
Evanta 2017 Break Away Leadership Award
Evanta
This honor, built on peer recognition, spotlights CISOs who are revolutionizing their organization’s competitive position in the marketplace through visionary leadership and business transformation.
-
ISE Luminary Award
ISE
Founded in 2005, the ISE® Luminary Leadership Award is conferred on annual basis to an extraordinary industry executive at the ISE® North America Awards Gala. This prestigious award showcases and honors an outstanding leader and industry practitioner for their distinguished service, stewardship and contributions in advancing the information security industry.
-
Information Security Executive of the Year Award 2014 North America- Healthcare
T.E.N.
-
BITS Leadership Award
BITS
Recognition for leadership of cross sector working group on Supply Chain Security
-
ISE Northeast Award 2009
T.E.N.
Organizations
-
NYU
Adjunct Faculty Member
- PresentI design cybersecurity related content for the Tandon School of Business for NYU
Recommendations received
54 people have recommended Jim
Join now to viewMore activity by Jim
-
Exciting news! Saviynt has teamed up with Accenture Philippines to revolutionize identity system management and security! 🌐🔐 In today's digital…
Exciting news! Saviynt has teamed up with Accenture Philippines to revolutionize identity system management and security! 🌐🔐 In today's digital…
Liked by Jim Routh
-
Today is my final day at Microsoft, concluding my enriching journey with RiskIQ that began over 8 years ago. I am immensely grateful to everyone I've…
Today is my final day at Microsoft, concluding my enriching journey with RiskIQ that began over 8 years ago. I am immensely grateful to everyone I've…
Liked by Jim Routh
-
We had a great time tonight cooking and breaking bread together as a team at Vino Venue!! GO Saviynt!! Bill Wirka Shawn H. Alex Cehanovich Eden Q…
We had a great time tonight cooking and breaking bread together as a team at Vino Venue!! GO Saviynt!! Bill Wirka Shawn H. Alex Cehanovich Eden Q…
Liked by Jim Routh
-
A few days before the invasion of Iraq in 2003, my commanding officer told me that a journalist from Rolling Stone would be riding with my platoon. I…
A few days before the invasion of Iraq in 2003, my commanding officer told me that a journalist from Rolling Stone would be riding with my platoon. I…
Liked by Jim Routh
-
🎯 "Security leaders are being targeted and prosecuted like never before, but the smart ones can take steps now to avoid that fate," according to…
🎯 "Security leaders are being targeted and prosecuted like never before, but the smart ones can take steps now to avoid that fate," according to…
Liked by Jim Routh
-
With the family! Happy Independence Day!
With the family! Happy Independence Day!
Liked by Jim Routh
-
👉 This excellent article by Dave Russell writing in AiThority.Com discusses the importance of data resilience and the types of tools 🛠 that can…
👉 This excellent article by Dave Russell writing in AiThority.Com discusses the importance of data resilience and the types of tools 🛠 that can…
Liked by Jim Routh
-
I recently had eye surgery. For about 8 days, I had limited use of my eyes -- that means no phones, no laptops, no TV, no books, and according to my…
I recently had eye surgery. For about 8 days, I had limited use of my eyes -- that means no phones, no laptops, no TV, no books, and according to my…
Liked by Jim Routh
-
Cyberstarts at Wimbledon pre-game warm ups.... Michael Shaulov Yotam Segev Roy Reznik Dor Knafo Gil Azrielant Idan Ninyo Eyal Mamo Guy Podjarny…
Cyberstarts at Wimbledon pre-game warm ups.... Michael Shaulov Yotam Segev Roy Reznik Dor Knafo Gil Azrielant Idan Ninyo Eyal Mamo Guy Podjarny…
Liked by Jim Routh
-
Who likes to ROCK #identity as hard as we do? 😃😃 Saviynt 🤘🤘Vans Tara Ryan Bashira Baset #NOFX #PunkRock #Vans #Drums
Who likes to ROCK #identity as hard as we do? 😃😃 Saviynt 🤘🤘Vans Tara Ryan Bashira Baset #NOFX #PunkRock #Vans #Drums
Liked by Jim Routh
-
This week, the U.S. was proud to host the NATO Summit in Washington, D.C. to celebrate 75 years of an indispensable transatlantic bond, marking NATO…
This week, the U.S. was proud to host the NATO Summit in Washington, D.C. to celebrate 75 years of an indispensable transatlantic bond, marking NATO…
Liked by Jim Routh
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Jim Routh in United States
-
Jim Routh
-
Jim Routh
General Manager at Magnum Point Marina
-
Jim Routh
-
JIM ROUTH
Project Professional at Jefferson Wells International
21 others named Jim Routh in United States are on LinkedIn
See others named Jim Routh