Climate Change Data

Omada

Climate Impact & Sustainability Data (2021, 2021-11 to 2022-03, 2022)

Reporting Period: 2021

Environmental Metrics

ESG Focus Areas

  • Cybersecurity
  • Identity Governance and Administration (IGA)
  • Zero Trust
  • Cloud Security
  • Remote Work Security

Climate Goals & Targets

Environmental Challenges

  • Managing identities in a hybrid (on-premises and multi-cloud) environment
  • Visibility gaps created by cloud-based applications
  • Shadow IT leading to inconsistent policy and control
  • Difficulty implementing least privilege access in cloud environments
  • Challenges in identifying segregation of duty violations in cloud environments
  • Increased difficulty managing identities with a remote workforce
  • Lack of centralized visibility and control over access to sensitive data in remote work scenarios
  • Increased difficulty meeting compliance regulations with data moved to the cloud
Mitigation Strategies
  • Modernizing identity and access management programs with a zero trust approach
  • Leveraging cloud-based IGA solutions for scalability and automation
  • Implementing strong authentication methods
  • Automating provisioning and de-provisioning of user accounts
  • Streamlining entitlement reviews and segregation of duties enforcement

Supply Chain Management

Climate-Related Risks & Opportunities

Reporting Period: 2021-11 to 2022-03

Environmental Metrics

ESG Focus Areas

  • Cybersecurity
  • Identity Governance and Administration (IGA)
  • Zero Trust
  • Ransomware Mitigation
  • Cloud Security

Climate Goals & Targets

Environmental Challenges

  • Manual provisioning and de-provisioning of accounts (49% of access requests handled manually)
  • Difficulty tracing changes in HR systems (45% manual intervention needed)
  • Cloud adoption creating regulatory complexity (64% of respondents)
  • Difficulty identifying data ownership and access in cloud environments
  • Challenges integrating new applications from an IGA perspective (61% find it challenging)
  • Multiple weeks needed to identify proper access and permissions for an identity (51% of respondents)
  • Difficulty identifying users with access to critical sensitive data (45% of respondents)
  • Long time to terminate departing employee's access (87% takes longer than a day)
  • Lack of automation in identity lifecycle (only 18% automatically update access based on role changes)
  • Manual entry of changes to multiple systems (45% of organizations)
Mitigation Strategies
  • Adoption of cloud-based IGA solutions (66% of respondents)
  • Investigation of zero trust strategies (52% of respondents)
  • Implementation of additional automation in processes (50% of respondents)
  • Increased investment in IGA (91% of respondents expect increased spending)
  • Focus on improving workforce productivity through IGA (46% see it as highest ROI)
  • Leveraging cloud-based IGA for analytics, scalability, and automated feature delivery

Supply Chain Management

Climate-Related Risks & Opportunities

Reporting Period: 2022

Environmental Metrics

Total Carbon Emissions:Not disclosed
Scope 1 Emissions:Not disclosed
Scope 2 Emissions:Not disclosed
Scope 3 Emissions:Not disclosed
Renewable Energy Share:Not disclosed
Total Energy Consumption:Not disclosed
Water Consumption:Not disclosed
Waste Generated:Not disclosed
Carbon Intensity:Not disclosed

ESG Focus Areas

  • Not disclosed

Environmental Achievements

  • Not disclosed

Social Achievements

  • Not disclosed

Governance Achievements

  • Not disclosed

Climate Goals & Targets

Long-term Goals:
  • Not disclosed
Medium-term Goals:
  • Not disclosed
Short-term Goals:
  • Not disclosed

Environmental Challenges

  • Manual identity lifecycle increases attack surface due to over-provisioning and under-provisioning.
  • Difficulty mapping user account access to critical sensitive data.
  • Time-consuming access provisioning (weeks to months).
  • Non-automated handling of user access requests.
  • Difficulty tracking manual changes to multiple systems.
  • Separate maintenance of employee and third-party contractor identities.
  • Manual review of access requests by help desk staff.
  • Cloud adoption creating regulatory complexity.
  • Cloud services complicating IGA programs.
  • Lack of control over identities leading to cybersecurity incidents and losses.
Mitigation Strategies
  • Adoption of cloud-based IGA solutions.
  • Implementation of zero trust approach.
  • Increased automation in processes.
  • Leveraging advanced analytics and artificial intelligence to identify and remediate identity-related threats and attacks.

Supply Chain Management

Supplier Audits: Not disclosed

Responsible Procurement
  • Not disclosed

Climate-Related Risks & Opportunities

Physical Risks
  • Not disclosed
Transition Risks
  • Not disclosed
Opportunities
  • Not disclosed

Reporting Standards

Frameworks Used: Null

Certifications: Null

Third-party Assurance: Not disclosed

UN Sustainable Development Goals

  • Not disclosed

Not disclosed

Sustainable Products & Innovation

  • Not disclosed

Awards & Recognition

  • Not disclosed