Access Management , Cloud Security , Digital Identity

Customer IAM: Myths and Realities

Okta's Keith Casey Previews Virtual Roundtable Discussion
Keith Casey, Okta

Enterprises long have practiced workforce identity and access management, but increasingly they are rolling out customer IAM, or CIAM. What’s driving the trend, and where should cybersecurity leaders look to assert influence? Keith Casey of Okta explores some CIAM myths and realities.

See Also: Visibility Into Distributed Cloud Environments

In a video interview with Information Security Media Group, Casey discusses:

  • The state of CIAM;
  • Who typically drives CIAM initiatives;
  • Signs of CIAM maturity.

Casey currently serves on the product team at Okta working on identity and authentication APIs. Previously, he served as an early developer evangelist at Twilio and before that worked on the Ultimate Geek Question at the Library of Congress. His underlying goal is to get good technology into the hands of good people to do great things. In his spare time, he helps build and support the Austin tech community, blogs at CaseySoftware.com and is fascinated by monkeys. He is also a co-author of “A Practical Approach to API Design” from Leanpub.

For more details about this and other virtual roundtables, please visit the Vrtual Roundtable registrations page.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.