SECURING DIGITAL IDENTITY: THE CONVERGENCE OF CYBERSECURITY AND IAM IN CONTEMPORARY ORGANIZATIONS

Authors

  • Ganesh Marrivada AmSoft Corp, USA Author

Keywords:

Identity And Access Management (IAM), Cybersecurity Implementation, Zero Trust Architecture, Regulatory Compliance, User Experience Security

Abstract

This comprehensive article examines the convergence of cybersecurity and Identity & Access Management (IAM) in modern organizations, focusing on their critical role in securing digital identities amid evolving cyber threats. The article explores fundamental IAM components, implementation strategies across various sectors, regulatory compliance frameworks, and the delicate balance between user experience and security measures. Through analysis of current trends and practices, the article highlights the transformation of security architectures to accommodate remote work environments, cloud access, and emerging technologies. The article impacts zero-trust frameworks, automated workflows, and advanced authentication mechanisms across the enterprise, healthcare, financial services, and education sectors. It further examines the complexities of global data protection standards, privacy-preserving methods, and the growing importance of user consent management. The article also delves into future trends, including integrating artificial intelligence, blockchain technology, and biometric authentication, while providing strategic recommendations for implementing comprehensive security frameworks that align with business objectives and stakeholder needs.

References

Anusha Kadambari Shanker; G. Usha, "Cyber threat landscape in cyber space," Available: https://ieeexplore.ieee.org/document/8203709

IEEE Digital Reality, "Digital Transformation: Impact on Organizational Security Architecture," Available: https://digitalreality.ieee.org/images/files/pdf/DRI_White_Paper_-_Digital_Transformation_-_Final_25March21.pdf

Ahmad Al-Tameem et al., "Critical factors of information security implementation," IEEE Conference on Network Softwareization (NetSoft). Available: https://ieeexplore.ieee.org/abstract/document/5272217

IEEE Public Safety Technology, "Cybersecurity of Critical Infrastructure with ICS/SCADA Systems," Available: https://publicsafety.ieee.org/topics/cybersecurity-of-critical-infrastructure-with-ics-scada-systems

Lamine Yade, "Remote Practical Work Environment based on Containers to replace Virtual Machines," IEEE Access, vol. 9, pp. 45123-45138, 2021. Available: https://ieeexplore.ieee.org/document/9766480

Sohail Imran et al., "Big Data Analytics in Healthcare - A Systematic Literature Review and Roadmap for Practical Implementation," Available: https://ieee-jas.net/article/doi/10.1109/JAS.2020.1003384?pageType=en

Orlando Amaral, "Model-Based Requirements for GDPR Compliance: A Systematic Analysis," Available: https://ieeexplore.ieee.org/document/9582337

IEEE Digital Privacy, "Global Adoption of Data Privacy Laws and Regulations," IEEE Transactions on Information Privacy and Security, vol. 18, no. 4, pp. 1893-1908, 2023. Available: https://digitalprivacy.ieee.org/publications/topics/global-adoption-of-data-privacy-laws-and-regulations#:~:text=Landmark%20examples%20include%20the%20EU%27s%20GDPR%2C%20Brazil%27s%20LGPD%2C,data%20minimization%2C%20transparency%20obligations%2C%20and%20individual%20privacy%20rights.

Fungai Bhunu Shava, "Factors affecting user experience with security features: A case study of an academic institution in Namibia," Available: https://ieeexplore.ieee.org/abstract/document/6641061

Pradeep K et al., "Understanding Location-Based User Experience," Nov.-Dec. 2014. Available: https://ieeexplore.ieee.org/document/6938662

S. Mohanarangan, "Unleashing the Power of AI and Machine Learning: Integration Strategies for IoT Systems," Available: https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=3461

Alex Preukschat et al., "Self-Sovereign Identity: Decentralized digital identity and verifiable credentials," Available: https://ieeexplore.ieee.org/document/10280453

Jeimy J. Cano M., "Cyber risk assessment A conceptual framework for executives," Available: https://ieeexplore.ieee.org/document/10211418

Mojtaba Shahin, "Continuous Integration, Delivery and Deployment: A Systematic Review on Approaches, Tools, Challenges and Practices," Available: https://ieeexplore.ieee.org/document/7884954

Published

2024-12-17

How to Cite

Ganesh Marrivada. (2024). SECURING DIGITAL IDENTITY: THE CONVERGENCE OF CYBERSECURITY AND IAM IN CONTEMPORARY ORGANIZATIONS. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING AND TECHNOLOGY (IJCET), 15(6), 1431-1439. https://mylib.in/index.php/IJCET/article/view/1749