Security programs rely on user adoption and many times security projects are pushed back on from the changes they introduce. HR on the other hand seems to be able to do whatever they want. Use that to your advantage in your Identity Management program, put HR in the driver’s seat and see what happens. Listen to how this works.
Be aware, be safe.
————————————
Website – https://binaryblogger.com
Twitter – https://www.twitter.com/binaryblogger
Podcast RSS – http://securityinfive.libsyn.com/rss
YouTube – https://www.youtube.com/binaryblogger
Email – contactme@binaryblogger.com
Music in this episode:
Greenhorn by Mystery Mammal is licensed under a Attribution-ShareAlike License.