3rd Party Risk Management , Access Management , COVID-19

Redefining the IAM Strategy for the Remote Workplace

Ericsson's Huneyd Discusses How CISOs Should Secure Identities and Enable User Access
Mustapha Huneyd, director, customer security, Ericsson

An IAM strategy for remote workforces should ensure that key stakeholders are aligned in listing key applications, infrastructure is mapped and risk- and role-based authentication for measuring user risk profiles are applied, says UAE-based Mustapha Huneyd, director of customer security at Ericsson.

See Also: Rapid Digitization and Risk: A Roundtable Preview

A strategy that uses "zero trust" models and is tightly integrating with a PAM strategy will prove beneficial, Huneyd says in a video interview with Information Security Media Group.

This interview was part of Information Security Media Group's recent Cybersecurity Virtual Summit: Middle East. Huneyd also offers insights on:

  • How to improve identity governance to provide appropriate user access;
  • Adopting an identity and data-centric cybersecurity model;
  • Building an IAM framework for a cloud strategy.

Before joining Ericsson, Huneyd was the global CISO of Ooredoo, a Qatar-based telecommunications firm. He has 23 years of cybersecurity, business continuity and risk management experience. He's a member of the Qatar National Cyber Security Strategy Committee and formerly led security teams in India, Southeast Asia, the GCC region and North Africa.


About the Author

Geetha Nandikotkur

Geetha Nandikotkur

Vice President - Conferences, Asia, Middle East and Africa, ISMG

Nandikotkur is an award-winning journalist with over 20 years of experience in newspapers, audiovisual media, magazines and research. She has an understanding of technology and business journalism and has moderated several roundtables and conferences, in addition to leading mentoring programs for the IT community. Prior to joining ISMG, Nandikotkur worked for 9.9 Media as a group editor for CIO & Leader, IT Next and CSO Forum.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.