Industry Insight

Industry Insight

Why Identity is the I in… High Impact Service Providers

Here’s the third blog in our series detailing how focusing on Identity can help your organization improve end-user experiences and meet consumer expectations. On its third anniversary, we look back at the Executive Order on Transforming Federal Customer Experience (CX) and Service Delivery to Rebuild Trust in Government, which highlights the U.S…

Innovation ignited: How product leaders fuel innovation with digital Identity

As champions of product innovation and customer experience, chief product officers, directors, and strategists play a strategic role in delivering products that make it easy for customers to solve their everyday challenges. However, competition in the SaaS industry is fierce. Unique features serve as competitive differentiators, but customers and…

Innovation ignited: How security leaders enable innovation with Identity

Chief information officers, directors, and other security leaders must walk a fine line between protecting data and ensuring authorized users have seamless access to tools and services. Their Identity and authentication strategies are responsible for proactively mitigating and remediating threats in a way that protects users’ trust. However,…

Innovation Ignited: How technologists spark innovation with Identity

Maintaining a technology stack that scales to meet the needs of employees, partners, and customers is increasingly complex, yet the stakes for managing app and data access are higher than ever. The tools and strategies that chief information officers and IT directors implement for managing identities and access have a direct impact on security…

The weakest link: Securing your extended workforce

Charlotte Wylie, SVP and Deputy Chief Security Officer at Okta, leads Okta’s technical cybersecurity services. This includes overseeing Okta’s global engineering teams to enhance the company’s security postures and programs that support its over 19,000 customers.  Charlotte has an extensive background in the delivery of security transformation…

Archive