How recent cyber-attacks are reshaping the Identity and Access Management landscape.