The instinct among security teams is often to establish policies that force users to comply with security standards to prevent system compromise. But what if they were given more choice? Shelly Epps, senior director of cyber risk services & program management at Duke Health, and Mary McKee, Duke University’s deputy CISO and senior director of identity management and security services, spoke to Jill Aitoro about enabling buy-in through empowerment of the users.
Security Staff Acquisition & Development, Vulnerability Management, Threat Management, Identity
Why Duke allows users to own their own authentication
An In-Depth Guide to Identity
Get essential knowledge and practical strategies to fortify your identity security.
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds