Why Read This Report
Overall spending on cybersecurity technologies and staffing is at an all-time high, but statistics show that the average size of data breaches continue to rise, and a large percentage of hacking-related breaches leverage either stolen and/or weak passwords. These metrics show a clear misalignment between cybersecurity investments and outcomes. Higher education institutions are particularly rich targets for data breaches. This guidebook reviews the research and surveys the market to draw conclusions and make recommendations about how an IAM strategy should evolve to protect the institution’s business risks and goals.
Key Questions Answered
- Why are higher education institutions very rich targets for data breaches?
- What are the current IAM trends in higher education around policies, staffing, and tool adoption?
- How do IAM programs differ by size and type of institution?
- What are the steps to starting or expanding an IAM program?
- How does an institution benchmark their current IAM capabilities and plan a maturity roadmap?
- Download complimentary Executive Summary.
- Author: Katelyn Ilkani, VP, Cybersecurity Advisory Practice, The Tambellini Group.
- Report Length: 48 pages.
- Report Availability: March 2018.
Table of Contents
- Executive Summary
- Previous Work
- Aegis Identity
- Harvard University
- The Tambellini Group
- Gaps in the Previous Work
- Methodology for this Guide
- Primary Research Methodology
- Secondary Research Methodology
- Primary Research Findings by Peer Group
- Barriers and Enablers to IAM Adoption
- Importance of Compliance
- Staff Needed for an IAM Program
- Enterprise vs. Homegrown vs. Open Source Tool Adoption
- Yearly IAM Software Costs
- The Maturity Curve — Functional Gaps
- Basic/Foundational Gaps
- Enhanced Gaps
- Advanced Gaps
- The 24-Month Outlook for Cloud IAM Tool Adoption
- Steps to Starting or Expanding an IAM Program
- People, Processes, and Technology
- The Role of Frameworks
- Appendix 1: Interview Questions
- Appendix 2: Survey Questions