article thumbnail

Enterprise Architect: A Role That Keeps Evolving

erwin

Enterprise architect is a common job title within IT organizations at large companies, but the term lacks any standard definition. That’s one of the reasons the enterprise architect role has no standard definition. As your organization navigates its digital transformation, it’s important to use tools that can do the same.

article thumbnail

BEST PRACTICES: Rising complexities of provisioning identities has pushed ‘IGA’ to the fore

The Last Watchdog

Its customer base is comprised of eight of the top 15 banks, four of the top six healthcare insurance and managed care providers, nine of the top 15 property and casualty insurance providers, five of the top 13 pharmaceutical companies, and 11 of the largest 15 federal agencies. Users re-defined. Most often, a user is a human being.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Honoring Women in Tech: Challenging IT Industry Perceptions

erwin

Libby is passionate about working with the right tools to capture the insights that are embedded in data so organizations run more effectively, while also making sure companies are compliant and as healthy as they can be. Another woman in tech #ChoosingToChallenge the narrow definition of what it means to be in IT. Thank you, Libby!

IT 85
article thumbnail

Regulatory Update: NAIC Summer 2021 National Meeting

Data Matters

Over the past year, more than 100 separate bills regulating PBMs have been introduced in 42 states following the December 10, 2020, unanimous decision by the Supreme Court in Rutledge vs. Pharmaceutical Care Management Association that backed an Arkansas state law that regulates PBMs and paved the way for state regulation of PBMs.

article thumbnail

Think Outside of the Gartner Magic Quadrant for Master Data Management Solutions to Deliver Connected Customer Experiences

Reltio

You’d be hard-pressed to find a definition of customer experience that doesn’t include the word “interactions.” And to that earlier PwC data point about trust and privacy, no pure-play MDM tool can manage consent and compliance. . Clean data is important. But that’s just a starting point. . So how does that play out?

article thumbnail

Iranian Peach Sandstorm group behind recent password spray attacks

Security Affairs

The cyber espionage activity attacks are aimed at organizations in the satellite, defense, and pharmaceutical sectors. Peach Sandstorm is an Iranian nation-state threat actor who has recently pursued organizations in the satellite, defense, and pharmaceutical sectors around the globe.” ” Microsoft concludes.

Passwords 106
article thumbnail

China’s First Data Protection Measures Lifting Its Veils

HL Chronicle of Data Protection

The draft Data Security Measures appear to mainly target the data processing activities of “network operators,” which under these draft measures has the same definition as is used in the Cyber Security Law , namely, including the owner or administrator of a network or a network service provider. credit information companies).