Omada
Climate Impact & Sustainability Data (2021, 2021-11 to 2022-03, 2022)
Reporting Period: 2021
Environmental Metrics
ESG Focus Areas
- Cybersecurity
- Identity Governance and Administration (IGA)
- Zero Trust
- Cloud Security
- Remote Work Security
Climate Goals & Targets
Environmental Challenges
- Managing identities in a hybrid (on-premises and multi-cloud) environment
- Visibility gaps created by cloud-based applications
- Shadow IT leading to inconsistent policy and control
- Difficulty implementing least privilege access in cloud environments
- Challenges in identifying segregation of duty violations in cloud environments
- Increased difficulty managing identities with a remote workforce
- Lack of centralized visibility and control over access to sensitive data in remote work scenarios
- Increased difficulty meeting compliance regulations with data moved to the cloud
Mitigation Strategies
- Modernizing identity and access management programs with a zero trust approach
- Leveraging cloud-based IGA solutions for scalability and automation
- Implementing strong authentication methods
- Automating provisioning and de-provisioning of user accounts
- Streamlining entitlement reviews and segregation of duties enforcement
Supply Chain Management
Climate-Related Risks & Opportunities
Reporting Period: 2021-11 to 2022-03
Environmental Metrics
ESG Focus Areas
- Cybersecurity
- Identity Governance and Administration (IGA)
- Zero Trust
- Ransomware Mitigation
- Cloud Security
Climate Goals & Targets
Environmental Challenges
- Manual provisioning and de-provisioning of accounts (49% of access requests handled manually)
- Difficulty tracing changes in HR systems (45% manual intervention needed)
- Cloud adoption creating regulatory complexity (64% of respondents)
- Difficulty identifying data ownership and access in cloud environments
- Challenges integrating new applications from an IGA perspective (61% find it challenging)
- Multiple weeks needed to identify proper access and permissions for an identity (51% of respondents)
- Difficulty identifying users with access to critical sensitive data (45% of respondents)
- Long time to terminate departing employee's access (87% takes longer than a day)
- Lack of automation in identity lifecycle (only 18% automatically update access based on role changes)
- Manual entry of changes to multiple systems (45% of organizations)
Mitigation Strategies
- Adoption of cloud-based IGA solutions (66% of respondents)
- Investigation of zero trust strategies (52% of respondents)
- Implementation of additional automation in processes (50% of respondents)
- Increased investment in IGA (91% of respondents expect increased spending)
- Focus on improving workforce productivity through IGA (46% see it as highest ROI)
- Leveraging cloud-based IGA for analytics, scalability, and automated feature delivery
Supply Chain Management
Climate-Related Risks & Opportunities
Reporting Period: 2022
Environmental Metrics
Total Carbon Emissions:Not disclosed
Scope 1 Emissions:Not disclosed
Scope 2 Emissions:Not disclosed
Scope 3 Emissions:Not disclosed
Renewable Energy Share:Not disclosed
Total Energy Consumption:Not disclosed
Water Consumption:Not disclosed
Waste Generated:Not disclosed
Carbon Intensity:Not disclosed
ESG Focus Areas
- Not disclosed
Environmental Achievements
- Not disclosed
Social Achievements
- Not disclosed
Governance Achievements
- Not disclosed
Climate Goals & Targets
Long-term Goals:
- Not disclosed
Medium-term Goals:
- Not disclosed
Short-term Goals:
- Not disclosed
Environmental Challenges
- Manual identity lifecycle increases attack surface due to over-provisioning and under-provisioning.
- Difficulty mapping user account access to critical sensitive data.
- Time-consuming access provisioning (weeks to months).
- Non-automated handling of user access requests.
- Difficulty tracking manual changes to multiple systems.
- Separate maintenance of employee and third-party contractor identities.
- Manual review of access requests by help desk staff.
- Cloud adoption creating regulatory complexity.
- Cloud services complicating IGA programs.
- Lack of control over identities leading to cybersecurity incidents and losses.
Mitigation Strategies
- Adoption of cloud-based IGA solutions.
- Implementation of zero trust approach.
- Increased automation in processes.
- Leveraging advanced analytics and artificial intelligence to identify and remediate identity-related threats and attacks.
Supply Chain Management
Supplier Audits: Not disclosed
Responsible Procurement
- Not disclosed
Climate-Related Risks & Opportunities
Physical Risks
- Not disclosed
Transition Risks
- Not disclosed
Opportunities
- Not disclosed
Reporting Standards
Frameworks Used: Null
Certifications: Null
Third-party Assurance: Not disclosed
UN Sustainable Development Goals
- Not disclosed
Not disclosed
Sustainable Products & Innovation
- Not disclosed
Awards & Recognition
- Not disclosed