In some cases, narrow identity management solutions will scale up to greater ambitions. In others, the scope may remain small. At both extremes, identity management pays off in very concrete ways when the scope and details are determined by the needs of the business.
Despite evidence of al-Qaeda's research into American utility companies gleaned from laptops seized after the Sept. 11 terrorist attacks, don't expect the U.S. National Security Agency, U.S. Central Intelligence Agency and U.S. Federal Bureau of Investigation to warn businesses when a cyberattack might take place.
Predictions that IT security jobs would be hot after the Sept. 11 terrorist attacks have not come true. Would-be employers say their security budgets are flat, risks and threats are rising, and they're being asked to do more with less because of staffing shortfalls elsewhere within their IT organizations.