Redefining the IAM Strategy for the Remote WorkplaceEricsson's Huneyd Discusses How CISOs Should Secure Identities and Enable User Access
An IAM strategy for remote workforces should ensure that key stakeholders are aligned in listing key applications, infrastructure is mapped and risk- and role-based authentication for measuring user risk profiles are applied, says UAE-based Mustapha Huneyd, director of customer security at Ericsson.
A strategy that uses "zero trust" models and is tightly integrating with a PAM strategy will prove beneficial, Huneyd says in a video interview with Information Security Media Group.
This interview was part of Information Security Media Group's recent Cybersecurity Virtual Summit: Middle East. Huneyd also offers insights on:
- How to improve identity governance to provide appropriate user access;
- Adopting an identity and data-centric cybersecurity model;
- Building an IAM framework for a cloud strategy.
Before joining Ericsson, Huneyd was the global CISO of Ooredoo, a Qatar-based telecommunications firm. He has 23 years of cybersecurity, business continuity and risk management experience. He's a member of the Qatar National Cyber Security Strategy Committee and formerly led security teams in India, Southeast Asia, the GCC region and North Africa.