Sept. 15, 2022, 6:35 p.m. | Victoria Willis

SC Magazine feed for Risk Management www.scmagazine.com

With decentralized identity management, access is distributed across multiple environments. Users must have different sets of credentials for any applications they access. Here's a quick take on decentralized identity:

decentralized decentralized identity identity identity and access

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)