Access Management , Identity & Access Management , Security Operations

How to Make Identity 'Sing'

Mike Kiser of Sailpoint Technologies on What Music Can Teach Us About Building an ID Platform
Mike Kiser, global strategist and evangelist, SailPoint Technologies

Music provides lessons on how to identify areas of normality and triage potential outliers. Mike Kiser of SailPoint Technologies explains how this can be applied to identity management.

See Also: Cloud Identity Security and the Power of PAM

In a video interview with Information Security Media Group previewing an upcoming virtual roundtable, Kiser discusses:

  • What the music of “The Police” can teach us about building a resilient and layered identity platform;
  • How to utilize identity in the aggregate to pinpoint areas of normality and to triage potential outliers and threats;
  • How to build a system of predictive identity that will adapt to change.

Kiser is global strategist and evangelist at SailPoint Technologies. He has held a variety of positions over the past 20 years, including security strategist, analyst and architect. He has designed, directed and advised on large-scale security deployments for a global clientele. He has been a speaker on network security and privacy issues and is the co-host of a podcast illuminating all things identity.

To learn more about this upcoming roundtable, please visit the registration page.


About the Author

Nick Holland

Nick Holland

Former Director, Banking and Payments

Holland focused on the intersection of digital banking, payments and security technologies. He has spoken at a variety of conferences and events, including Mobile World Congress, Money2020, Next Bank and SXSW, and has been quoted by The Wall Street Journal, CNN Money, MSNBC, NPR, Forbes, Fortune, BusinessWeek, Time Magazine, The Economist and the Financial Times.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.