POPULARITY
This episode is sponsored by SlashID. Visit https://www.slashid.com/idac to learn more.In this sponsored episode of the Identity at the Center Podcast, hosts Jeff and Jim interview Vincenzo Iozzo, CEO of SlashID, to discuss the current landscape and innovations they are making in Identity and Access Management (IAM). Vincenzo, who has a background in offensive security and experience at CrowdStrike, explains how SlashID uses Large Language Models (LLMs) to enhance visibility and posture beyond traditional Identity Governance and Administration (IGA) and Privileged Access Management (PAM) tools. Slash ID focuses on real-time detection and response to identity-based threats, addressing gaps that compliance-driven IGA systems miss. The episode also covers the advantages of SlashID's platform, including monitoring privileged identities, automating policy generation for least privilege, and integrating with existing security infrastructure. The conversation delves into the challenges of identity-related breaches and the importance of balancing compliance with robust security measures. Vincenzo also shares his experiences from the offensive security world, including hacking competitions and the evolving threat landscape.Timestamps00:00 Introduction to Real-Time Identity Security01:20 Welcome to the Identity at the Center Podcast02:18 Meet Vincenzo Iozzo, CEO of SlashID02:37 Vincenzo's Journey into Digital Identity04:26 The Genesis of SlashID08:16 Challenges in Identity Governance and Administration (IGA)14:41 The Prevalence of Identity-Related Breaches19:06 Detection and Response Strategies24:30 Lifecycle Issues Detection26:11 Remediation Strategies28:57 Integration with Existing Tools30:27 Customer Success Metrics34:10 Setting Up and Deploying SlashID35:48 Live Demo Walkthrough41:48 Challenges in Cybersecurity45:16 Final Thoughts and Contact InformationConnect with Vincenzo: https://www.linkedin.com/in/vincenzoiozzo/Learn more about SlashID: https://www.slashid.com/idacConnect with us on LinkedIn:Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/Visit the show on the web at idacpodcast.com and watch at https://www.youtube.com/@idacpodcast
Eve Maler returns to Identity at the Center for her seventh episode, bringing her signature insight and humor to a deep conversation about the state of digital identity. Jeff and Jim explore the gap between lagging IAM programs and next-gen technologies with Eve, who dives into her research on non-human identities, the power of identity services as products, and how martech and adtech intersect with customer IAM. Plus, get a preview of her EIC talk and the latest on Identi-Squabble, the identity game show set for Identiverse. Don't miss this packed and playful discussion!Timestamps:00:00 - Assume breach, assume tracking02:03 - Jim's IAM theory and gap analysis10:00 - Identi-Squabble game show preview13:00 - Eve joins, talks SXSW experience18:00 - Non-traditional Venn diagrams & stakeholder models22:00 - Personhood credentials and digital death27:00 - MarTech, AdTech, and the identity connection35:00 - Consent is dead: what it means for IAM47:00 - Treating identity as a product50:00 - Identity's role in organizational silos53:00 - Identity Security: what is it really?59:00 - Is “identity” big enough to hold all these qualifiers?01:00:00 - Lighter note: would you rather meet past or future self?Connect with Eve: https://www.linkedin.com/in/evemaler/Venn Factory: https://www.vennfactory.com/Conference Discounts!Identiverse 2025 - Use code IDV25-IDAC25 for 25% off: https://identiverse.com/Connect with us on LinkedIn:Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/Visit the show on the web at http://idacpodcast.comKeywords:Eve Maler, IAM, Identity at the Center, Identiverse, Identisquabble, Martech, Adtech, Personhood Credentials, Identity Security, Consent Management, Non-Human Identity, Identity as Product, Digital Identity, Venn Factory, Identity Governance, IAM Strategy, South by Southwest Identity, Privacy by Design
Today's modern network has placed identity management in the forefront to manage a plethora of landscapes – on and off prem, public and private, hybrid, and the new kid on the block, alt-clouds. This week on Feds At The Edge, we explore how the Defense Information Systems Agency (DISA) is leading the charge in modern identity management, once a backwater concept, to center stage, with its ambitious program, Thunderdome. Chris Pymm, Portfolio Manager, Zero Trust & Division Chief for ID7 at DISA, shares how Thunderdome spans 50 sites and 12,000 users, automating identity controls to outpace threats like lateral movement. We also hear from Quest Software Public Sector cybersecurity expert Chris Roberts, who breaks identity management down to its core: know the user, know the device, know the behavior. Tune in on your favorite podcasting platform today to hear how DISA is redefining identity for today's distributed networks—and what your agency can take from their playbook.
In this episode of the Security Matters podcast, host David Puner sits down with Lior Yaari, CEO and co-founder of Grip Security, for a discussion that covers the concept of identity debt and its implications for modern cybersecurity. Lior shares insights from his experience in Israel's elite Unit 8200 and explains why identity is now the new security perimeter. They delve into the challenges organizations face in managing SaaS applications, the impact of generative AI on cybersecurity and the importance of proactive identity governance. Tune in for tips on how to protect your organization from within and stay ahead of evolving threats.
Discover how to rethink Identity Governance and Administration (IGA) to meet the demands of a dynamic workforce, rapid application turnover, and evolving compliance needs. Learn key strategies for modernizing IGA with agility, automation, and policy-driven solutions. Read the original blog post here: https://www.kuppingercole.com/blog/kuppinger/rethinking-identity-governance-and-administration-iga-in-the-digital-era
In this episode of the Trust Issues podcast, host David Puner and David Lee, aka “The Identity Jedi,” delve into the evolving landscape of identity security. They discuss the critical challenges and advancements in securing both human and machine identities. Lee shares insights on the fear and misconceptions surrounding AI, drawing parallels to pop culture references like Marvel's Jarvis. They explore the potential of autonomous AI in monitoring and managing security tasks, emphasizing the need for real time data analysis and context understanding. The conversation highlights the importance of providing context on both human and machine sides to enhance security measures. They also touch on the role of investors in the identity security space and the need for better storytelling in the industry.
In this special episode of the Identity at the Center podcast, recorded live from the SailPoint Navigate 2024 conference in Orlando, hosts Jeff and Jim engage with Andrew Moore, VP of Product Management at SailPoint. The conversation spans a variety of critical themes, including the management of identity platforms, product development, and the importance of customer feedback. Andrew details his career journey, including his transition from Under Armour to SailPoint, and shares insights into the development of connected products, data-driven design, and user experience enhancements. The episode also introduces the latest innovations, such as Privileged Task Automation and Machine Identity Security, emphasizing their potential to address productivity and security risks. Furthermore, the speakers discuss the transformative role of AI in Identity Governance and Administration (IGA), highlighting the importance of explainable AI and maintaining strong security standards. This episode is a deep dive into the dynamic landscape of identity governance and the strategies driving continuous innovation. 00:00 Welcome to the Identity at the Center Podcast 01:55 Conference Insights and Future Plans 03:38 Introducing Andrew Moore 03:52 Andrew Moore's Journey into Identity 06:48 Product Management at SailPoint 16:48 Innovative Projects and Customer Feedback 23:17 Exploring Low Code and No Code Identity Automations 23:53 Understanding Customer Feedback and Research Techniques 24:41 Balancing Positive and Negative Feedback 00:24 Dealing with Critical Feedback 29:34 Announcing the Product Roadmap 30:37 Privileged Task Automation: A Game Changer 39:11 Machine Identity Security: New Innovations 42:33 The Future of AI in Identity Governance 47:12 Addressing Concerns About AI in IGA 50:40 Conclusion and Final Thoughts Connect with Andrew: https://www.linkedin.com/in/richardandrewmoore/ Learn more about SailPoint: https://www.sailpoint.com/ SailPoint Navigate 2024 London - Use code IDAC for a £300 discount - https://www.sailpoint.com/navigate/london Semperis' Hybrid Identity Protection Conference (HIP Conf) - Use code IDACpod for 20% off: https://www.hipconf.com/ Gartner IAM Summit - Save $375 on registration using our exclusive code IDAC375: https://www.gartner.com/en/conferences/na/identity-access-management-us Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at http://idacpodcast.com
In this episode of Identity at the Center podcast, hosts Jeff and Jim delve into Microsoft's approach to identity and access management with guest Merrill Fernando, a product manager at Microsoft. Merrill shares his journey into the identity space, the current state and future plans for Entra ID, and the importance of DevOps and governance in identity management. The conversation also touches on the potential of AI in security with the introduction of Security Copilot and the intricacies of managing non-human identities. 00:00 Introduction and Greetings 01:53 Concert Experience and Technology 05:48 Travel and Work Updates 07:54 Conference Announcements and Discount Codes 11:22 Guest Introduction: Merrill Fernando 12:08 Merrill's Journey into Identity 18:54 Role and Responsibilities at Microsoft 24:09 DevOps and Identity Management 33:21 DevTestProd Environment Setup 36:10 Challenges with Machine IDs in DevOps 40:12 Understanding Service Principles 42:42 Microsoft's Identity Governance and Administration 50:25 The Role of AI in Identity Management 56:15 Hiking as a Decompression Activity 01:04:35 Final Thoughts and Wrap-Up Connect with Merill: https://www.linkedin.com/in/merill/ Microsoft 365 / Entra DevOps Tenant Model: https://x.com/merill/status/1683783494324097025 Attending Identity Week in America or Asia? Use our discount code IDAC30 for 30% off your registration fee! Learn more at: http://terrapinn.com/IDWUS/Part-IDAC Authenticate Conference - Use code IDAC15 for 15% off: https://authenticatecon.com/event/authenticate-2024-conference/ Hybrid Identity Protection Conference (HIP Conf) - Use code IDACpod for 20% off: https://register.hipconf.com/W7eVML Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at http://idacpodcast.com and watch at https://www.youtube.com/@idacpodcast
In the latest episode of the Trust Issues podcast, the focus is on the criticality of time in organizational security. The conversation with host David Puner and guest Katherine Mowen, SVP of Information Security at Rate (formerly Guaranteed Rate), highlights the importance of swift decision-making and prompt threat response. They discuss the role of just-in-time (JIT) access and AI in accelerating response times, as well as the ever-evolving threat landscape that requires constant vigilance. The episode emphasizes the strategies and technologies shaping the future of cybersecurity, particularly at the intersection of time management and identity protection. Join us for a timely discussion that underscores the intersection of time management and identity protection.
In this special 5-year anniversary episode of the Identity at the Center podcast, hosts Jeff and Jim dive deep into the ongoing debate between centralized and decentralized identity management. They discuss key concepts such as single sign-on, the importance of evaluating and questioning identity management strategies, and the need to balance usability with security. The episode also covers the importance of having an IAM strategy and roadmap, detailing the steps to create, assess, develop recommendations, build a roadmap, and communicate effectively. They share personal insights, funny behind-the-scenes stories, and emphasize the value of community support. The episode concludes with Jim and Jeff looking forward to the future of the podcast and thanking their listeners for their continued engagement. 00:00 Introduction and Greetings 00:25 Centralized vs Decentralized Identity Management 03:19 Risk-Based Approach to Identity Management 05:10 The IAM Submarine Analogy 06:40 Podcast Milestones and Community Engagement 08:37 Reflections on Podcast Journey 16:47 Developing an IAM Strategy 33:02 The Magic Number: Why Three is Key 33:12 Grouping Recommendations into Projects 35:21 The Importance of Strategy Over Tactics 36:22 Creating and Implementing a Roadmap 37:59 Customizing Your Roadmap for Your Organization 42:39 Prioritizing and Communicating Your Strategy 49:03 Maintaining Momentum and Adjusting the Roadmap 55:09 Behind the Scenes: Podcast Production Insights Attending Identity Week in Europe, America, or Asia? Use our discount code IDAC30 for 30% off your registration fee! Learn more at: Europe: https://www.terrapinn.com/exhibition/identity-week/ America: https://www.terrapinn.com/exhibition/identity-week-america Asia: https://www.terrapinn.com/exhibition/identity-week-asia/ Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at http://idacpodcast.com and watch at https://www.youtube.com/@idacpodcast
In this episode of the Identity at the Center podcast, hosts Jeff and Jim return from Identiverse 2024 and share their experiences from the conference held in Las Vegas. They discuss notable moments, including unique conference swag and memorable interactions. Special guest Adam Michael, CISO and adjunct professor at Texas A&M University, joins the conversation to discuss the evolution of identity management to identity security at the university. Adam delves into the complexities of managing identity in a higher education environment and shares insights on implementing DevOps practices. The episode covers topics like AI's impact on teaching, infrastructure as code, ROI of identity security projects, and the challenges and benefits of centralizing IT services. Connect with Adam: https://www.linkedin.com/in/amikeal/ The Phoenix Project (book): https://www.amazon.com/Phoenix-Project-DevOps-Helping-Business/dp/0988262592 Attending Identity Week in Europe, America, or Asia? Use our discount code IDAC30 for 30% off your registration fee! Learn more at: Europe: https://www.terrapinn.com/exhibition/identity-week/ America: https://www.terrapinn.com/exhibition/identity-week-america Asia: https://www.terrapinn.com/exhibition/identity-week-asia/ Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at idacpodcast.com and follow @IDACPodcast on Twitter.
In this engaging episode, hosts Jim McDonald and Jeff Steadman wrap up their Identiverse 2024 experience with a thought-provoking panel discussion. Joined by Alex Bovee, CEO and Co-Founder of ConductorOne; Ian Glazer, Founder and President of Weave Identity; and Lance Peterman, Identity Lead at Dick's Sporting Goods and Professor at UNC Charlotte, the conversation dives deep into the future of identity management. The panel explores the concept of Zero Standing Privileges (ZSP) as the evolution of least privilege, discussing its feasibility, operational challenges, and the maturity curve required for organizations to adopt such a model. Ian shares his perspective on the future of identity governance, while Alex and Lance provide insights into practical implementations and the role of automation in achieving ZSP. The discussion also touches on the importance of context, policy, and the need for better data orchestration to make identity management more effective. Tune in for an insightful conversation on the next frontier of identity management and the steps needed to get there. Connect with Alex Bovee - https://www.linkedin.com/in/alexbovee/ Learn about ConductorOne - https://www.conductorone.com/?utm_source=identityatthecenter&utm_medium=podcast&utm_campaign=c1-brand Connect with Ian: https://www.linkedin.com/in/iglazer/ Learn about Weave Identity - https://weaveidentity.com/ Connect with Lance - https://www.linkedin.com/in/lancepeterman/ Attending Identity Week in Europe, America, or Asia? Use our discount code IDAC30 for 30% off your registration fee! Learn more at: Europe: https://www.terrapinn.com/exhibition/identity-week/ America: https://www.terrapinn.com/exhibition/identity-week-america Asia: https://www.terrapinn.com/exhibition/identity-week-asia/ Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at http://idacpodcast.com and watch at https://www.youtube.com/@idacpodcast
On this episode of Identity at the Center, Jim McDonald and Jeff Steadman are joined by Chad Wolcott, Managing Director at RSM US LLP, to peel back the layers of the identity industry. They delve into the complexities of identity consulting, discussing the challenges and triumphs of implementing and managing IAM solutions. From Chad's early days of designing robots to Jim's arcade escapades, the trio shares their most unusual jobs and the lessons learned from their unique experiences. They also tackle pressing topics like the future of passwordless authentication, the role of AI and analytics in identity, and the evolution of authorization from RBAC to dynamic access models. The conversation takes a turn into the realm of IAM horror stories, highlighting the pitfalls of over-engineering solutions and the importance of aligning with organizational change. As they gear up for Identiverse, they share their excitement for reconnecting with industry peers, diving into sessions on AI and identity security, and enjoying the Vegas experience. Tune in for an insightful and candid discussion on the state of identity security, the potential of AI, and the power of automation in the ever-evolving IAM landscape. Connect with Chad: https://www.linkedin.com/in/chad-wolcott/ Meet up with our RSM team at Identiverse 2024! Schedule at https://rsmus.com/events/2024-events/join-rsm-at-identiverse-2024.html Learn more about RSM Digital Identity consulting: https://rsmus.com/services/risk-fraud-cybersecurity/cybersecurity-business-vulnerability/identity-and-access.html Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at idacpodcast.com and follow @IDACPodcast on Twitter.
In this episode of Identity at the Center, hosts Jim McDonald and Jeff Steadman delve into the intricate world of authorization within the IAM space with Omri Gazit, co-founder and CEO of Asserto, and co-chair of the AuthZEN working group at the OpenID Foundation. They tackle the evolution of authorization, from the days of basic role-based access control to the current landscape of fine-grained authorization, including policy and relationship-based access control models. Omri shares his insights on the importance of standards in authorization, the role of developers in adopting these standards, and the journey towards a single authorization control plane for multiple applications. He also discusses the challenges organizations face with over-provisioned access and the potential of AI in enhancing authorization decisions. Listeners will also get a personal glimpse into Omri's life outside of IAM, learning about his passion for kung fu and how the discipline and journey of martial arts have influenced his professional ethos. Tune in for a comprehensive discussion on the future of authorization and the steps IAM practitioners can take to evolve their organization's approach to this critical aspect of identity security. Connect with Omri: https://www.linkedin.com/in/ogazitt/ Learn more about Aserto: https://www.aserto.com/ AuthZEN: https://openid.net/wg/authzen/ Google Zanzibar: https://research.google/pubs/zanzibar-googles-consistent-global-authorization-system/ Identiverse 2024: As an IDAC listener, you can register with 25% off by using code IDV24-IDAC25 at https://events.identiverse.com/identiverse2024/register?code=IDV24-IDAC25 Meet up with our RSM team! Schedule at https://rsmus.com/events/2024-events/join-rsm-at-identiverse-2024.html Attending the European Identity and Cloud Conference in Berlin? Use Discount Code: EIC24idac25 for 25% off. Register at https://www.kuppingercole.com/events/eic2024 Attending Identity Week in Europe, America, or Asia? Use our discount code IDAC30 for 30% off your registration fee! Learn more at: Europe: https://www.terrapinn.com/exhibition/identity-week/ America: https://www.terrapinn.com/exhibition/identity-week-america Asia: https://www.terrapinn.com/exhibition/identity-week-asia/ Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at http://idacpodcast.com and follow @IDACPodcast on Twitter.
Microsoft is promising to put security first, again. Three features have been added to Windows 11 Canary build 26212. Microsoft shuts down some game developer studios under its Xbox Games Studios, including a popular one that published Hi-Fi RUSH. And Playstation recinds PSN account requirement for Helldivers 2 on PC. Microsoft & Security Microsoft promises to put security first. Again. Microsoft adds passkey support to Microsoft accounts. Windows 11 Windows 11 Canary build 26212 adds three features from the beta channel. Microsoft starts controlled feature rollouts (CFRs) on Windows Insider dev channel. Microsoft acknowledges VPN connection issues on Windows 11 and Windows 10. More improvements to Tiny11 Builder. Arc for Windows shipped last week. Armed and Ready Apple announces M4 along with new iPad Pros. Qualcomm earnings flat, but big promises for current quarter. AI Better prompt writing is coming to Microsoft 365 Copilot. OpenAI is allegedly testing its replacement for Google Search. Microsoft allegedly testing LLM that challenges OpenAI. Xbox Microsoft shuts down more Xbox studios, triggering a new round of angst. Starfield is getting the 60 FPS support it should have had at launch on Xbox Series X. Nintendo has now sold over 141 million Switch consoles, promises Switch 2. Just kidding on the PSN account requirement for PC Helldivers 2. Tips and picks Tip of the week: Build Blogger Bash App pick of the week: DesktopGPT Plus: Proton Pass gets much-needed account protection features. RunAs Radio this week: Identity Governance with Jef Kazimer. Brown liquor pick of the week: Shelter Point Cask Strength Single Malt. Hosts: Leo Laporte, Paul Thurrott, and Richard Campbell Download or subscribe to this show at https://twit.tv/shows/windows-weekly Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Check out Paul's blog at thurrott.com The Windows Weekly theme music is courtesy of Carl Franklin. Sponsor: kolide.com/ww
Microsoft is promising to put security first, again. Three features have been added to Windows 11 Canary build 26212. Microsoft shuts down some game developer studios under its Xbox Games Studios, including a popular one that published Hi-Fi RUSH. And Playstation recinds PSN account requirement for Helldivers 2 on PC. Microsoft & Security Microsoft promises to put security first. Again. Microsoft adds passkey support to Microsoft accounts. Windows 11 Windows 11 Canary build 26212 adds three features from the beta channel. Microsoft starts controlled feature rollouts (CFRs) on Windows Insider dev channel. Microsoft acknowledges VPN connection issues on Windows 11 and Windows 10. More improvements to Tiny11 Builder. Arc for Windows shipped last week. Armed and Ready Apple announces M4 along with new iPad Pros. Qualcomm earnings flat, but big promises for current quarter. AI Better prompt writing is coming to Microsoft 365 Copilot. OpenAI is allegedly testing its replacement for Google Search. Microsoft allegedly testing LLM that challenges OpenAI. Xbox Microsoft shuts down more Xbox studios, triggering a new round of angst. Starfield is getting the 60 FPS support it should have had at launch on Xbox Series X. Nintendo has now sold over 141 million Switch consoles, promises Switch 2. Just kidding on the PSN account requirement for PC Helldivers 2. Tips and picks Tip of the week: Build Blogger Bash App pick of the week: DesktopGPT Plus: Proton Pass gets much-needed account protection features. RunAs Radio this week: Identity Governance with Jef Kazimer. Brown liquor pick of the week: Shelter Point Cask Strength Single Malt. Hosts: Leo Laporte, Paul Thurrott, and Richard Campbell Download or subscribe to this show at https://twit.tv/shows/windows-weekly Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Check out Paul's blog at thurrott.com The Windows Weekly theme music is courtesy of Carl Franklin. Sponsor: kolide.com/ww
Microsoft is promising to put security first, again. Three features have been added to Windows 11 Canary build 26212. Microsoft shuts down some game developer studios under its Xbox Games Studios, including a popular one that published Hi-Fi RUSH. And Playstation recinds PSN account requirement for Helldivers 2 on PC. Microsoft & Security Microsoft promises to put security first. Again. Microsoft adds passkey support to Microsoft accounts. Windows 11 Windows 11 Canary build 26212 adds three features from the beta channel. Microsoft starts controlled feature rollouts (CFRs) on Windows Insider dev channel. Microsoft acknowledges VPN connection issues on Windows 11 and Windows 10. More improvements to Tiny11 Builder. Arc for Windows shipped last week. Armed and Ready Apple announces M4 along with new iPad Pros. Qualcomm earnings flat, but big promises for current quarter. AI Better prompt writing is coming to Microsoft 365 Copilot. OpenAI is allegedly testing its replacement for Google Search. Microsoft allegedly testing LLM that challenges OpenAI. Xbox Microsoft shuts down more Xbox studios, triggering a new round of angst. Starfield is getting the 60 FPS support it should have had at launch on Xbox Series X. Nintendo has now sold over 141 million Switch consoles, promises Switch 2. Just kidding on the PSN account requirement for PC Helldivers 2. Tips and picks Tip of the week: Build Blogger Bash App pick of the week: DesktopGPT Plus: Proton Pass gets much-needed account protection features. RunAs Radio this week: Identity Governance with Jef Kazimer. Brown liquor pick of the week: Shelter Point Cask Strength Single Malt. Hosts: Leo Laporte, Paul Thurrott, and Richard Campbell Download or subscribe to this show at https://twit.tv/shows/windows-weekly Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Check out Paul's blog at thurrott.com The Windows Weekly theme music is courtesy of Carl Franklin. Sponsor: kolide.com/ww
Microsoft is promising to put security first, again. Three features have been added to Windows 11 Canary build 26212. Microsoft shuts down some game developer studios under its Xbox Games Studios, including a popular one that published Hi-Fi RUSH. And Playstation recinds PSN account requirement for Helldivers 2 on PC. Microsoft & Security Microsoft promises to put security first. Again. Microsoft adds passkey support to Microsoft accounts. Windows 11 Windows 11 Canary build 26212 adds three features from the beta channel. Microsoft starts controlled feature rollouts (CFRs) on Windows Insider dev channel. Microsoft acknowledges VPN connection issues on Windows 11 and Windows 10. More improvements to Tiny11 Builder. Arc for Windows shipped last week. Armed and Ready Apple announces M4 along with new iPad Pros. Qualcomm earnings flat, but big promises for current quarter. AI Better prompt writing is coming to Microsoft 365 Copilot. OpenAI is allegedly testing its replacement for Google Search. Microsoft allegedly testing LLM that challenges OpenAI. Xbox Microsoft shuts down more Xbox studios, triggering a new round of angst. Starfield is getting the 60 FPS support it should have had at launch on Xbox Series X. Nintendo has now sold over 141 million Switch consoles, promises Switch 2. Just kidding on the PSN account requirement for PC Helldivers 2. Tips and picks Tip of the week: Build Blogger Bash App pick of the week: DesktopGPT Plus: Proton Pass gets much-needed account protection features. RunAs Radio this week: Identity Governance with Jef Kazimer. Brown liquor pick of the week: Shelter Point Cask Strength Single Malt. Hosts: Leo Laporte, Paul Thurrott, and Richard Campbell Download or subscribe to this show at https://twit.tv/shows/windows-weekly Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Check out Paul's blog at thurrott.com The Windows Weekly theme music is courtesy of Carl Franklin. Sponsor: kolide.com/ww
How's your identity governance? Richard talks to Jef Kazimer from Microsoft about Entra's capabilities to help you have robust governance around identity. Jef talks about the lifecycle of identity - when someone joins the organization and a new identity gets created, privileges changing as roles evolve, to the eventual offboarding when that person departs. The same sort of cycle exists for devices, too - the question is only how much work you must do to get through those cycles. Entra offers tooling to get identity changes out of your support tickets - make your life easier with effective identity governance! LinksMicrosoft EntraConditional AccessMicrosoft Entra Permission ManagementRoad to the CloudEntitlement ManagementMy Access PortalJust Enough AdministrationPrivileged Access WorkstationEntra Lifecycle WorkflowsAzure Logic AppsUsage and Insight Reports in Entra425 ShowRecorded April 26, 2024
Microsoft is promising to put security first, again. Three features have been added to Windows 11 Canary build 26212. Microsoft shuts down some game developer studios under its Xbox Games Studios, including a popular one that published Hi-Fi RUSH. And Playstation recinds PSN account requirement for Helldivers 2 on PC. Microsoft & Security Microsoft promises to put security first. Again. Microsoft adds passkey support to Microsoft accounts. Windows 11 Windows 11 Canary build 26212 adds three features from the beta channel. Microsoft starts controlled feature rollouts (CFRs) on Windows Insider dev channel. Microsoft acknowledges VPN connection issues on Windows 11 and Windows 10. More improvements to Tiny11 Builder. Arc for Windows shipped last week. Armed and Ready Apple announces M4 along with new iPad Pros. Qualcomm earnings flat, but big promises for current quarter. AI Better prompt writing is coming to Microsoft 365 Copilot. OpenAI is allegedly testing its replacement for Google Search. Microsoft allegedly testing LLM that challenges OpenAI. Xbox Microsoft shuts down more Xbox studios, triggering a new round of angst. Starfield is getting the 60 FPS support it should have had at launch on Xbox Series X. Nintendo has now sold over 141 million Switch consoles, promises Switch 2. Just kidding on the PSN account requirement for PC Helldivers 2. Tips and picks Tip of the week: Build Blogger Bash App pick of the week: DesktopGPT Plus: Proton Pass gets much-needed account protection features. RunAs Radio this week: Identity Governance with Jef Kazimer. Brown liquor pick of the week: Shelter Point Cask Strength Single Malt. Hosts: Leo Laporte, Paul Thurrott, and Richard Campbell Download or subscribe to this show at https://twit.tv/shows/windows-weekly Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Check out Paul's blog at thurrott.com The Windows Weekly theme music is courtesy of Carl Franklin. Sponsor: kolide.com/ww
Microsoft is promising to put security first, again. Three features have been added to Windows 11 Canary build 26212. Microsoft shuts down some game developer studios under its Xbox Games Studios, including a popular one that published Hi-Fi RUSH. And Playstation recinds PSN account requirement for Helldivers 2 on PC. Microsoft & Security Microsoft promises to put security first. Again. Microsoft adds passkey support to Microsoft accounts. Windows 11 Windows 11 Canary build 26212 adds three features from the beta channel. Microsoft starts controlled feature rollouts (CFRs) on Windows Insider dev channel. Microsoft acknowledges VPN connection issues on Windows 11 and Windows 10. More improvements to Tiny11 Builder. Arc for Windows shipped last week. Armed and Ready Apple announces M4 along with new iPad Pros. Qualcomm earnings flat, but big promises for current quarter. AI Better prompt writing is coming to Microsoft 365 Copilot. OpenAI is allegedly testing its replacement for Google Search. Microsoft allegedly testing LLM that challenges OpenAI. Xbox Microsoft shuts down more Xbox studios, triggering a new round of angst. Starfield is getting the 60 FPS support it should have had at launch on Xbox Series X. Nintendo has now sold over 141 million Switch consoles, promises Switch 2. Just kidding on the PSN account requirement for PC Helldivers 2. Tips and picks Tip of the week: Build Blogger Bash App pick of the week: DesktopGPT Plus: Proton Pass gets much-needed account protection features. RunAs Radio this week: Identity Governance with Jef Kazimer. Brown liquor pick of the week: Shelter Point Cask Strength Single Malt. Hosts: Leo Laporte, Paul Thurrott, and Richard Campbell Download or subscribe to this show at https://twit.tv/shows/windows-weekly Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Check out Paul's blog at thurrott.com The Windows Weekly theme music is courtesy of Carl Franklin. Sponsor: kolide.com/ww
In this episode of the Identity at the Center Podcast, hosts Jim McDonald and Jeff Steadman sit down with Patrick Harding, Chief Product Architect at Ping Identity, to discuss the fascinating intersection between AI and the IAM industry. They explore Harding's journey into the IAM industry, his view on the definition of AI, and dive into a thought-provoking conversation about the future of AI, its potential impacts on identity, and the importance of AI governance. They also touch on the Ping + ForgeRock product roadmap. Don't miss this insightful conversation! Connect with Patrick: https://www.linkedin.com/in/pharding/ Learn more about Ping Identity: https://www.pingidentity.com/ Identiverse 2024: As an IDAC listener, you can register with 25% off by using code IDV24-IDAC25 at https://events.identiverse.com/identiverse2024/register?code=IDV24-IDAC25 Attending the European Identity and Cloud Conference in Berlin? Use Discount Code: EIC24idac25 for 25% off. Register at https://www.kuppingercole.com/events/eic2024 Attending Identity Week in Europe, America, or Asia? Use our discount code IDAC30 for 30% off your registration fee! Learn more at: Europe: https://www.terrapinn.com/exhibition/identity-week/ America: https://www.terrapinn.com/exhibition/identity-week-america Asia: https://www.terrapinn.com/exhibition/identity-week-asia/ Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at idacpodcast.com and follow @IDACPodcast on Twitter.
Today's guest is Craig Ramsay, Senior Solutions Architect at Omada. Founded in 2000, Omada is a global market leader in Identity Governance and Administration (IGA). They offer a full-featured, enterprise-grade, cloud-native IGA solution that enables organizations to achieve compliance, reduce risk, and maximize efficiency. For over 20 years, Omada delivers innovative identity management to complex hybrid environments based on their proven best practice process framework and deployment approach. Omada Identity Cloud meets the security, compliance and efficiency needs of business leaders, removing cost and uncertainty from managing identities and access. The solution enables organizations to manage identity lifecycle, policy and role management, access requests, access certification, and fulfillment using automated provisioning and service tickets. It provides configurable adaptable models out of the box, minimizing the time and cost of administration. In today's episode, Craig will discuss: His journey to now, including experience in the Police Force, An overview of Omada's leadership in cloud identity governance, Why Identity governance is central to cyber risk management strategy, Success stories on how Omada emphasizes identity governance modernization, Omada's accelerator package for initial setup and customized progress, Current trends from modernizing legacy systems and AI integration
In this episode of State of Identity, host Cameron D'Ambrosi welcomes Alex Bovee, co-founder and CEO of ConductorOne to explore the evolving challenges and solutions in the digital identity space. Learn what's driving the rise of identity-based security risks and how ConductorOne is tackling these issues through centralized identity governance and access controls. The conversation focuses on needing a more flexible approach to identity management, addressing common concerns like access control, multifactor authentication, and the ongoing struggle to balance security with productivity. It also offers insights on how businesses can better manage identity-related risks while ensuring a seamless user experience.
Unlock the essentials of next-gen security with InfosecTrain's ‘Unlocking SC-300: Mastering Identity Solutions, Part 2'. This introductory Session provides a deep dive into the strategies and technologies shaping modern identity management solutions. Join us to learn how to enhance your organization's security posture effectively. Perfect for IT professionals looking to stay ahead in the cybersecurity field! ➡️ Agenda for the Masterclass
In this episode, Jim and Jeff welcome back Sandy Bird, the CTO and Co-Founder of Sonrai Security, for a sequel to their first sponsor spotlight. Sandy returns to discuss the groundbreaking Cloud Permissions Firewall with Permissions on Demand. The trio dives into how this new solution revolutionizes the way organizations can clamp down on excessive cloud permissions, streamline operations, and secure their cloud environments with unprecedented speed and efficiency. The discussion illuminates the concept of "default deny," the exhilaration of zapping "zombie" identities, and the seamless integration with cloud native tools. Sandy also shares insights on how customers can measure success with Sonrai's solution and the significant security benefits provided. For a visual walkthrough of Sonrai's Cloud Permissions Firewall, visit http://sonrai.co/idac to see the demo in action and learn how you can try it out with a 14-day free trial. And if you're at RSA, AWS re:Inforce, or Gartner IAM, look for the Sonrai Security booth and experience the epiphany moment for yourself. Connect with Sandy on LinkedIn: https://www.linkedin.com/in/sandy-bird-835b5576 Learn more about Sonrai Security: https://sonrai.co/idac Introducing the Cloud Permissions Firewall (YouTube): https://www.youtube.com/watch?v=ffQbM6KGDbY Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at idacpodcast.com and follow @IDACPodcast on Twitter. Episode Keywords Identity And Access Management (Iam), Cloud Security, Aws, Azure, Gcp (Google Cloud Platform), Least Privilege, Identity Risk, Cloud Permissions Firewall, Infrastructure As Code, Security Operations (Secops), Cloud Operations (Cloudops), Permissions Management, Excessive Privileges, Zombie Identities, Identity Governance, Access Analyzer, Sensitive Permissions, Role-Based Access Control (Rbac), Service Control Policies (Scp), Cloud Native Security
Could your company's board benefit from cybersecurity expertise? Discover the untold impact security professionals can make in risk mitigation and financial stability. This week on the CISSP Cyber Training Podcast, I, Sean Gerber, navigate the critical intersection of cybersecurity and corporate governance, underscoring a need for expertise that's often overlooked. We dissect the lifecycle of role management, from the precise art of onboarding to the essential processes of deprovisioning and offboarding. Ensuring your organization's digital fortress is impenetrable requires immediate action and smart tools, which we'll cover in detail.Struggle with managing permissions in your organization? You're not alone. We'll break down Role-Based Access Control, a system that not only fortifies your security but streamlines your access management too. By understanding the risks of credential creep and the benefits of roles defined by job functions, you'll see how a robust RBAC system can prevent conflicts of interest and align with evolving business processes. And for those in the trenches of cybersecurity, I'll outline how the synergy between compliance and security teams forms the backbone of a solid role management plan.Finally, we turn our focus to the CISSP exam, providing a beacon for those charting a course through the vast sea of cybersecurity knowledge. With strategic guidance and essential resources, I'll steer you towards not just passing the exam, but mastering it. Ensure you're equipped with the right identity and access management tools like single sign-on, multi-factor authentication, and Identity Governance and Administration. Remember, your journey doesn't end with certification. Stay connected for continued support as we build your cybersecurity expertise into a powerhouse skill set for any organization.Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free. Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!
In this interview, we talk to Rod Simmons, the VP of Product Strategy at Omada. We'll discuss the complex topic of securing identities against ever growing threats. We'll discuss challenges like unnecessary access, accounts with too many permissions, and a threat landscape that is increasingly finding success from targeting identities. Finally, we'll discuss where the Identity Governance and Administration (IGA) market is going. Segment Resources: Analyst Report: The State of Identity Governance 2024 We don't cover a lot of stories in this week's episode, but we go deep on a few important ones. I'm biased, but I think it's a good one, especially having Darwin's input and encyclopedic knowledge available to us. Also in this week's news: Homomorphic encryption pops up again! Microsoft Security Copilot has a release date! Sudo for Windows Microsegmentation pops up again! The TikTok Ban Darwin's Newsletter: The Cybersecurity Pulse All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-353
In this episode, hosts Jim McDonald and Jeff Steadman welcome back Paul Mezzera. Paul, who last joined us in November of 2022, takes us through what has been happening in his world since then. The conversation delves into the rapidly evolving field of Privileged Access Management (PAM), where Paul unpacks the driving forces behind these changes and shares his predictions for the future of PAM. Paul shares his extensive experience with Identity Governance and Administration (IGA), including his time at Saviynt, and offers his thoughts on the current state of the IGA market. He also shares his experiences and challenges while working in Identity and Access Management at UC Davis. To wrap up, Paul gives us a peek into what's coming next for him. Connect with Paul: https://www.linkedin.com/in/paulmezzera/ The Least Privilege Fallacy or How I Learned to Stop Worrying and Love Zero Standing Privilege (Weave Identity Blog Article): https://weaveidentity.com/blog/2024/01/10/the-least-privilege-fallacy-or-how-i-learned-to-stop-worrying-and-love-zero-standing-privilege/ Identiverse 2024: As an IDAC listener, you can register with 25% off by using code IDV24-IDAC25 at https://events.identiverse.com/identiverse2024/register?code=IDV24-IDAC25 Attending Identity Week in Europe, America, or Asia? Use our discount code IDAC30 for 30% off your registration fee! Learn more at: Europe: https://www.terrapinn.com/exhibition/identity-week/ America: https://www.terrapinn.com/exhibition/identity-week-america Asia: https://www.terrapinn.com/exhibition/identity-week-asia/ Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at idacpodcast.com and follow @IDACPodcast on Twitter.
In this interview, we talk to Rod Simmons, the VP of Product Strategy at Omada. We'll discuss the complex topic of securing identities against ever growing threats. We'll discuss challenges like unnecessary access, accounts with too many permissions, and a threat landscape that is increasingly finding success from targeting identities. Finally, we'll discuss where the Identity Governance and Administration (IGA) market is going. Segment Resources: Analyst Report: The State of Identity Governance 2024 We don't cover a lot of stories in this week's episode, but we go deep on a few important ones. I'm biased, but I think it's a good one, especially having Darwin's input and encyclopedic knowledge available to us. Also in this week's news: Homomorphic encryption pops up again! Microsoft Security Copilot has a release date! Sudo for Windows Microsegmentation pops up again! The TikTok Ban Darwin's Newsletter: The Cybersecurity Pulse All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-353
In this interview, we talk to Rod Simmons, the VP of Product Strategy at Omada. We'll discuss the complex topic of securing identities against ever growing threats. We'll discuss challenges like unnecessary access, accounts with too many permissions, and a threat landscape that is increasingly finding success from targeting identities. Finally, we'll discuss where the Identity Governance and Administration (IGA) market is going. Segment Resources: Analyst Report: The State of Identity Governance 2024 Show Notes: https://securityweekly.com/esw-353
In this interview, we talk to Rod Simmons, the VP of Product Strategy at Omada. We'll discuss the complex topic of securing identities against ever growing threats. We'll discuss challenges like unnecessary access, accounts with too many permissions, and a threat landscape that is increasingly finding success from targeting identities. Finally, we'll discuss where the Identity Governance and Administration (IGA) market is going. Segment Resources: Analyst Report: The State of Identity Governance 2024 Show Notes: https://securityweekly.com/esw-353
Data and identity governance should be a top-of-mind issue for business leaders in 2024. CYBER1 Solutions MD Jayson O'Reilly and senior cybersecurity architect Christiaan Swanepoel share their insights on this important topic in this episode of TechCentral's business technology show, TCS+. They kick off the discussion with a definition of the topic, and why it's critically important that companies get data and identity governance right in a world of significantly heightened cyber risk. It's by no means a new focus area – indeed, many organisations have been trying to solve this for years, decades even, showing just how difficult it is to get right. O'Reilly and Swanepoel discuss how the threat landscape has evolved over time, and the risks organisations face if they overlook data governance protocols. In this TCS+ episode, they also tackle these key questions: • What are examples of the tangible consequences of disregarding data governance and the direct implications for personal security? • Identity has been a focus for many organisations for the past 10 years or longer, so why does it remain a problem to be solved and what are the roadblocks in getting it done right? • How does the mishandling of personal information compromise privacy? • In what ways do emerging technologies, such as artificial intelligence and the internet of things complicate Identity governance efforts. • What is the impact of legislation such as South Africa's Protection of Personal Information Act and Europe's General Data Protection Regulation, and what's next on the horizon from a regulatory perspective? Don't miss discussion on a topic of critical importance to modern, data-driven organisations. About CYBER1 Solutions CYBER1 Solutions is a cybersecurity specialist operating in Southern Africa, East and West Africa, Dubai, and Europe. Its solutions deliver information security; IT risk management; fraud detection; governance and compliance; and a full range of managed services. It also provides bespoke security services across the spectrum, with a portfolio that ranges from the formulation of its customers' security strategies to the daily operation of end-point security solutions. To do this, it partners with world-leading security vendors to deliver cutting-edge technologies augmented by its wide range of professional services. Its services enable organisations in every sector to prevent attacks by providing the visibility into vulnerabilities they need to detect compromises rapidly, respond to breaches and stop attacks before they become an issue. Visit www.c1-s.com for more. TechCentral
Hva er Identity Governance, hvorfor er det viktig og hva man bør tenke på når man skal jobbe med det? Tobias Ljunggren, en erfaren senior løsningskonsulent fra OpenText, er gjest i studio og deler sin ekspertise i diskusjon med IAM arkitekt Arne Vedø-Hansen. Hosted on Acast. See acast.com/privacy for more information.
Prevent over-permissioning of your data and resources using a Zero Trust “Just enough access” approach with proactive role-based Conditional Access controls with Microsoft Entra. Privileged identities, like admins, are your highest value targets. Use identity governance controls to scope their access to just what they need to perform their specific job roles within specified time limits. For everyday users, ensure “just enough access” so users can only access what they need to get their jobs done. This is done using Entitlement Management to select the right resources and apps to prevent over-permissioning. With Conditional Access adaptive controls, you can ensure users and devices meet predefined conditions prior to granting access to any resource. Jeremy Chapman, Microsoft 365 Director, shares the controls you can put in place to help ensure access to your resources is protected. ► QUICK LINKS: 00:00 - Microsoft Entra Conditional Access and ID Governance 01:35 - Privileged Identities 02:51 - How to activate Just-in-Time access 04:32 - Just Enough Access and entitlement management 06:08 - Create access packages07:47 - Conditional Access09:16 - Pre-built templates10:20 - Wrap up ► Link References: Get started, go to https://entra.microsoft.com For more information, check out https://learn.microsoft.com/entra Watch our show and demo on lifecycle workflow automation at https://aka.ms/ILMMechanics ► Unfamiliar with Microsoft Mechanics? As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft. • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter: https://twitter.com/MSFTMechanics • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/ • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics
Let's talk about digital identity with Craig Ramsay, Senior Solutions Architect at Omada. What is Identity Governance and Why is it important? Craig Ramsay, Senior Solutions Architect at Omada joins Oscar to explore all things Identity Governance including – the role of Identity Governance in compliance with regulations and standards, how it affects security and risk management for organisation, alongside some real-world examples of Identity Governance in use. [Transcript below] "We're still trying to shake off the thing that - security is a barrier to efficiency. There's an old adage that ‘efficiency is insecure, but security is inefficient'. But I don't think that's true anymore." Craig Ramsay, Senior Solution Architect at Omada, from Edinburgh, Scotland. I have worked at Omada for 3 years and have previously worked at RSA Security and different financial services organisations in the UK within their Identity functions. Outside of work my main interests are hiking and travelling. Connect with Craig on LinkedIn. We'll be continuing this conversation on LinkedIn using #LTADI – join us @ubisecure! Go to @Ubisecure on YouTube to watch the video transcript for episode 102. Podcast transcript Oscar Santolalla: This week I am joined by Craig Ramsay from Omada, here to discuss the importance of identity governance and how it is helping to solve problems in real-world. Stay tuned to find out more. Let's Talk About Digital Identity, the podcast connecting identity and business. I am your host, Oscar. Oscar: Hello, for today's episode about Identity Governance and Administration, mostly known as IGA, we have invited a super interesting guest who is Craig Ramsay. He is a Senior Solution Architect at Omada. He's from Edinburgh, Scotland. He has worked for Omada for three years and has previously worked at RSA Security and different financial services organisations in the United Kingdom within their identity functions. Outside of work, Craig's main interests are hiking and travelling. Hello, Craig. Craig Ramsay: Hey, Oscar. How are you doing? Oscar: Very good. Nice talking with you. Craig: Thank you, you too. Oscar: So, let's talk about digital identity. As usual, we want to hear more about our guests. Please tell us about yourself and your journey to this world of identity. Craig: Sure. So, I mean, thank you for the introduction. And I guess, in terms of my journey into identity, it was a little bit by fluke rather than by design. I studied Computer Science and when I graduated, I joined an operational IT graduate scheme. They had recently started a new IAM project, because I think back in 2008, identity and access management, identity governance wasn't as mature as it is now. It was still kind of seen as an operational IT project rather than an information security principle. So, the drivers there were more about the efficiency, automated provisioning and stuff. But yeah, they were looking for a graduate on that project. That was me. And apart from a few years where I decided to try what it was like being a policeman, I have worked in identity ever since either for, as you said, financial services organisations doing the work at the coalface or for vendors, either in project delivery or, and you know pre-sales in my solution architect role. Oscar: Excellent. So, let's go first with the basics. We have not talked about IGA yet in this podcast, have not focused on that. So, tell us, what is that? What is Identity Governance and Administration, IGA? What is important? Craig: Sure. So, I mean, identity governance, when you focus on it, at its core, it's a solution that will ensure the right individuals have the right access for the right reasons at the right time in your organisation. So, it's protecting the authorisations or the resource assignments within your organisation. And that's often policy-driven to ensure that all of, and I think the important distinction here when we talk...
Zluri is a cloud-native SaaSOps platform enabling modern enterprises with SaaS Management and Identity Governance. Zluri empowers IT and Security teams to gain visibility into their SaaS landscape, unlock recurring savings, & securely govern access with provisioning and de-provisioning. Zluri's technology is powered by a deep discovery engine, in-built iPaas, and its evolving AI, enabling companies to easily navigate & control complex SaaS ecosystems. Connect with Sethu
In this episode of the Identity at the Center Podcast, Jim and Jeff welcome Dave Middleton, Senior Vice President at Bank of America responsible for IAM and Cryptography Product Management. Dave shares his insights on various topics related to identity and access management (IAM). The episode begins with a discussion on how Dave got into the field of identity and the role of a product manager. Dave also talks about his conference experiences and the importance of balancing security and usability in IAM solutions. The conversation then delves into the difference between digital identity and IAM, as well as the evolving landscape of Identity Governance and Administration (IGA). Dave provides his thoughts on risk-based access governance and the role of technologies like Zero Standing Privilege (ZSP) and User Behavior Analytics (UBA). To wrap up the episode on a lighter note, Dave is asked to choose a universe to live in between The Walking Dead, Game of Thrones, and The Matrix. Connect with Dave: https://www.linkedin.com/in/davidmidd/ Learn more about Year Up: https://www.yearup.org/ Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at idacpodcast.com and follow @IDACPodcast on Twitter.
Anirudh Sen, VP Products at Saviynt joins Nitish Deshpande, Research Analyst at KuppingerCole Analysts to explore the realm of Third Party Access Governance and its key distinctions from Identity Governance and Administration (IGA). Discover the evolving landscape of corporate Access Governance, the challenges of securing third-party relationships, and the benefits organizations can gain from effective third-party governance. Learn about the crucial role of AI and automation and gain valuable insights to help your organization stay ahead in managing third-party risks and access.
Anirudh Sen, VP Products at Saviynt joins Nitish Deshpande, Research Analyst at KuppingerCole Analysts to explore the realm of Third Party Access Governance and its key distinctions from Identity Governance and Administration (IGA). Discover the evolving landscape of corporate Access Governance, the challenges of securing third-party relationships, and the benefits organizations can gain from effective third-party governance. Learn about the crucial role of AI and automation and gain valuable insights to help your organization stay ahead in managing third-party risks and access.
Automate manual steps to onboard and offboard users as they enter or leave your organization using Microsoft Entra. For onboarding, manage user identities, grant permissions to access necessary information, and provide users with what they need to be productive, such as computer hardware. As people leave the organization, deprovisioning is critical to maintain security and compliance. Lifecycle Workflows in Microsoft Entra ID Governance can help with pre-built templates for common tasks. Microsoft Entra is a complete identity management platform with everything you knew about Azure Active Directory, along with new capabilities. Identity lifecycle management automation removes many of the manual steps of everyday identity management tasks. With Lifecycle Workflows, users experience more consistency for better job satisfaction and reduced risk. It works with HR systems, like Workday and SuccessFactors, as part of the onboarding and offboarding workflow. Jeremy Chapman, Director of Microsoft 365, walks through Identity Lifecycle Management automation in Microsoft Entra. ► QUICK LINKS: 00:00 - Introduction 01:28 - Automate employee onboarding 04:19 - Automate employee offboarding 05:41 - Workflow history 06:58 - Built-in change tracking for version history 08:30 - Wrap up ► Link References: For more on lifecycle workflows, check out https://aka.ms/ILMDocs Try it out at https://entra.microsoft.com ► Unfamiliar with Microsoft Mechanics? As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft. • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter: https://twitter.com/MSFTMechanics • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/ • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics
This episode is another must listen for those wanting to ensure they are putting in place the right controls to secure both business and personal data. My guest is Garret Grajek, President and CEO of YouAttest, a cloud-based access review engine that provides identity and security compliance for all resources. We discuss how failing to manage systems access is one of the fundamental mistakes organisations can make yet is one of the easiest to fix.Garret challenges us to reflect on our organisations Identity Governance by asking ourselves the following questions:Who has access to our systems?Do they have the right level of access?Can you certify / attest that this access information is current and accurate?If you can't answer these questions, or you are unsure about any of them, have a listen to this episode - you'll get some great insight in how to manage this fundamental cybersecurity requirement.As always, enjoy the episode!Contact ABM Risk Partnership email us: info@abmrisk.com.au Tweet us at @4RiskCme Visit our LinkedIn page https://www.linkedin.com/company/18394064/admin/ Thanks for listening to the show and please keep your guest suggestions coming!
In the episode of the KuppingerCole Analyst Chat series, Martin Kuppinger and host Matthias engage in a detailed discussion about the challenges associated with the integration of Identity Governance and Administration (IGA) into identity management systems based on on-premises Active Directories. They dissect the structural and deployment aspects of Active Directories, highlighting how these often conflict with contemporary access governance paradigms. Martin explains why these contradictions can make the overlay of IGA on Active Directories extremely challenging, if not entirely unfeasible.
In the episode of the KuppingerCole Analyst Chat series, Martin Kuppinger and host Matthias engage in a detailed discussion about the challenges associated with the integration of Identity Governance and Administration (IGA) into identity management systems based on on-premises Active Directories. They dissect the structural and deployment aspects of Active Directories, highlighting how these often conflict with contemporary access governance paradigms. Martin explains why these contradictions can make the overlay of IGA on Active Directories extremely challenging, if not entirely unfeasible.
Jim and Jeff talk with Igor Farinic, Co-Founder at Evolveum, about the role of open-source options as a transparent and collaborative approach to software development In the Identity Governance & Administration (IGA) space, which can help ensure the security and reliability of the software. Connect with Igor: https://www.linkedin.com/in/igorfarinic/ Learn more about Evolveum: https://evolveum.com/ Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at idacpodcast.com and follow @IDACPodcast on Twitter.
SaaS is eating the world even more than we think. Companies are dealing with SaaS sprawl: hundreds of apps distributed across different owners that store sensitive data and which are used to orchestrate critical business workflows. Security-minded teams are turning to external compliance frameworks to help protect their customers and data. However, traditional identity governance controls have fallen short of delivering real security outcomes in this digital-first world. They're missing a critical piece: automation. In this episode, ConductorOne's CEO and Co-Founder, Alex Bovee joins this episode to discuss why we need to change the way we think about compliance and risk and what a security-led governance program could look like. Learn more about ConductorOne at https://www.linkedin.com/company/conductorone/ or https://www.conductorone.com/blog/automating-compliance-controls-least-privilege-access/
On this week's episode, Adam and Andy talk about Identity Governance and Administration (IGA). They talk about what makes up a good IGA program and advice on some policies and procedures. They also talk about Azure AD Governance and Entra Permissions Management which are some great solutions for an IGA program. ------------------------------------------- Youtube Video Link: https://youtu.be/Gg-zFlhDOwc ------------------------------------------- Documentation: https://learn.microsoft.com/en-us/azure/active-directory/governance/identity-governance-overview ------------------------------------------- Contact Us: Website: https://bluesecuritypod.com Twitter: https://twitter.com/bluesecuritypod Linkedin: https://www.linkedin.com/company/bluesecpod Youtube: https://www.youtube.com/c/BlueSecurityPodcast Twitch: https://www.twitch.tv/bluesecuritypod ------------------------------------------- Andy Jaw Mastodon: https://infosec.exchange/@ajawzero Twitter: https://twitter.com/ajawzero LinkedIn: https://www.linkedin.com/in/andyjaw/ Email: andy@bluesecuritypod.com ------------------------------------------- Adam Brewer Twitter: https://twitter.com/ajbrewer LinkedIn: https://www.linkedin.com/in/adamjbrewer/ Email: adam@bluesecuritypod.com --- Send in a voice message: https://anchor.fm/blue-security-podcast/message
Join Somerford's Anne Mundy for a discussion about the importance of your digital identity. Imprivata's Andy Wilcox adds his background and familiarity in exploring why digital identity is so important, as well as delving into tangible workplace examples and how businesses are able to rapidly assess the effectiveness of their current strategy through Imprivata's solution suite.Somerford is a certified Premier Partner with #imprivata. The Imprivata platform addresses critical compliance and security challenges while improving provider productivity. #Digitalidentity is the cornerstone of Imprivata, enabling effective, efficient, secure, and compliant access and management for the systems, applications, and data.━━━━Additional resources:✓ Explore Imprivata's 'Digital Identity Framework' in full:https://www.imprivata.co.uk/digital-identity-framework✓ Quickly assess the effectiveness of your current strategy: https://www.imprivata.com/assess━━━━▶ Listen on Spotify: https://open.spotify.com/show/00soJ9kAQuVCh9EBRHOGzJ▶ Listen on Google Podcasts: https://podcasts.google.com/?feed=aHR0cHM6Ly9mZWVkcy5idXp6c3Byb3V0LmNvbS8xMDkyNTAwLnJzcw==▶ Listen on Apple Podcasts: https://podcasts.apple.com/us/podcast/the-somerford-podcast/id1515273563?uo=4━━━━✓ Learn more about Somerford on our website:https://www.somerfordassociates.com/✓ View our complimentary partner discovery webinars and workshops:https://www.somerfordassociates.com/events/✓ Keep notified of news & announcements on Linkedin:https://www.linkedin.com/company/somerford-associates-limited/✓ Contact Somerford for more information regarding this video:https://www.somerfordassociates.com/contact-us/
Jim and Jeff talk with Paul Mezzara, Vice President of Strategy with Saviynt, about his background as a Gartner analyst and some of the challenges of proper identity governance across an organization. Connect with Paul: https://www.linkedin.com/in/paulmezzera/ Learn more about Saviynt: https://saviynt.com/ Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show at www.IdentityAtTheCenter.com, follow @IDACPodcast on Twitter, and check out our live streams at www.idac.live
Identity Governance and Administration (IGA) combines the traditional User Access Provisioning (UAP) and Identity and Access Governance (IAG) markets. Nitish Deshpande joins Matthias for the first time on the occasion of the publication of the Leadership Compass IGA 2022, which he has created. They both have a look at this evolving and fascinating market segment. Leadership Compass Identity Governance and Administration: https://www.kuppingercole.com/research/lc81107/identity-governance-and-administration-2022
Identity Governance and Administration (IGA) combines the traditional User Access Provisioning (UAP) and Identity and Access Governance (IAG) markets. Nitish Deshpande joins Matthias for the first time on the occasion of the publication of the Leadership Compass IGA 2022, which he has created. They both have a look at this evolving and fascinating market segment. Leadership Compass Identity Governance and Administration: https://www.kuppingercole.com/research/lc81107/identity-governance-and-administration-2022
Lots of people call themselves category creators. But are they really?In this fifth episode of The Notorious Thought Leader podcast, Kari Hanson, VP of Marketing at Spiro, joins Erin Balsa to:Explain the difference between coining a term and creating a categoryShare how she helped create the Identity Governance category at SailPointChat about content that builds credibility and thought leadership“Thought leadership is about building credibility behind your opinions and views in a specific market.” - Kari Hanson, VP of Marketing at Spiro
Let's talk about digital identity with Roberth Lundin, Senior Security Consultant at Knowit. In episode 76, Senior Security Consultant at Knowit, Roberth Lundin, discusses identification services in Sweden alongside Smart Cards – what identification services are available in Sweden and why should someone have a BankID or Freja e-ID as well as what smart cards are and what is interesting about these. [Transcript below] "But if you take a smart card, for example, well, you can't copy a smart card. That's very important." Roberth Lundin is Senior Security Consultant at Knowit. For the last years he has been working with Bankgirot as an IT-security specialist, in which one of his most important duties is to coordinate all security audits using risk-based approach, also worked with SOC/SIEM system, identity governance and administration (IGA). In his vast experience he has seen and contributed to the evolution of eIDs in Sweden including smart cards. Connect with Roberth on LinkedIn. We'll be continuing this conversation on Twitter using #LTADI – join us @ubisecure! Podcast transcript Let's Talk About Digital Identity, the podcast connecting identity and business. I am your host, Oscar Santolalla. Come to meet us in person. Ubisecure are attending Security Leadership Belgium on October the 5th and 6th in Brussels. Come and meet us to find out how Ubisecure can help with your business challenges in cyber security and CIAM. To find out more, take a look at the Ubisecure events page, www.ubisecure.com/events. See you in Brussels. Oscar Santolalla: Thank you for joining a new episode of Let's Talk About Digital Identity. I was thinking, personally, I have been using for accessing many online services, I use many authentication methods, identification services that we have been discussing in this podcast, three years. But one that I have not used is a smart cards. For instance, even though hereby being a citizen of Finland, I have one, but I have not used it before. So that's one of the things we're going to discuss today, how to use a smart card for identification. And also, what are the other identification services in Europe and especially from Sweden that is from where our guest today is coming. Our guest today is Roberth Lundin. He is a Senior Security Consultant at Knowit. For the last years, he has been working with Bankgirot as an IT Security Specialist in which one of his most important duties is to coordinate all security audits using risk-based approach. He also works with SOC SCM systems, Identity Governance and Administration, IGA among all the roles in his vast experience he has seen and contributed to the evolution of eIDs in Sweden, including smart cards. Hello, Roberth. Roberth Lundin: Hello. Oscar: OK, Roberth. So, let's talk about data identity. But first of course, we want to hear a bit more about yourself. So please, you can tell us, yeah, your journey to this world of the that identity. Roberth: I started in 1989 at a company named Bull. The first project I got was to finish a secure login and file transfer tool for UNIX, which use smart cards, high security smart cards, actually. Then I have been working for the next 20 years at Bull, Integris, Steria with personalisation systems for smart cards, issue system for electronic IDs and so on. 2009, I started work at Cybercom, which is now named Knowit. 2014, I started the first signing service using DIGGs framework, which I still work with part-time and been working for since 2015 to 2018 with electronic medical certificate and signing of them as a security specialist. And then for 2019, I worked at Bankgirot to secure their operations. That's my background basically, very shortly. Oscar: Fantastic. We're going to talk about smart cards and also the eIDs in Sweden and Europe. But first, I know something interesting is to think of in a broader aspect all the authentication methods and ways of verifying identi...
Identity Governance and Administration (IGA) systems are a fundamental part of an enterprises identity and access management strategy. For companies that need functionalities like role-based access and automated approval, IGA systems can be essential in ensuring that the right people are getting access to the right things. Sounds easy enough, but issues with adoption, sponsorship and employee access speak to the fact that plenty of things can derail a deployment. In this episode of the EM360 Podcast, Analyst https://em360tech.com/user/3627 (Richard Stiennon) speaks to https://www.linkedin.com/in/rodlsimmons/ (Rod Simmons), VP of Product Strategy at https://em360tech.com/tech-index/omada (Omada), about: Automating already broken processes Disconnect between IGA goals and business goals Testing, testing, testing
Episode Notes Alan and Sam discuss how Identity Governance within Azure AD, part of Microsofts Entra family of identity products can help with your user lifecycle. Alan takes the role of the 'Expert' and explains how Entitlement Management, Access Reviews and Privileged Access can secure, review, and give access. Find out more at http://www.letstalkpodcast.co.uk Send us your feedback online: https://pinecast.com/feedback/lets-talk-azure/5aa1adc3-4e30-4759-b41e-a6b1a3bb7fa6
This is the audio-only version of our twice weekly cyber security talk show, teissTalk. Join us twice a week for free by visiting www.teiss.co.uk/talk On this episode, we focus on the following news story; One in Three Workers Monitored by Their Employers https://www.infosecurity-magazine.com/news/one-three-workers-monitored/ The panel discussion is titled “Identity Governance in a hybrid work world” https://www.teiss.co.uk/teisstalk/identity-governance-in-a-hybrid-work-world/ This episode is hosted by Jenny Radcliffe https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/ Our Guests are Todd Wade, Chief Information Security Officer, Sokin https://www.linkedin.com/in/twade/ Matt Hardy, Chief Information Security Officer, OMNIO https://www.linkedin.com/in/matthardy67/ Ingo Schubert, Global Cloud Identity Architect- CISSP-ISSAP, CCSP, SecurID, an RSA business https://www.linkedin.com/in/ingo-schubert/
Shared security, also known as shared responsibility, is a cloud security management model that describes the distribution of enterprise data security management and accountability between a company and its cloud service provider(s). The framework essentially enables improved productivity and unparalleled agility, so why isn't every organization adopting it? In this episode, introduced by Neira Jones, Dr. Eric Cole, Founder and CEO of Secure Anchor Consulting,, explores adopting shared security as best practice. Dr. Eric speaks with Chris Martin, IAM Presales Solution Architect for EMEA at Thales. The podcast delves into the main areas of organizational risk concerning cloud migration and vendor native decisions before shedding light on the limitations of a single service provider. The guests then discuss the shared security model - its benefits and the implementation process. Final thoughts centre on what organizations need to understand about control over all users and effectively build a best practice shared security strategy You can also learn more about this topic in our new whitepaper, Owning Your Own Access Security. Dr Eric Cole Dr. Eric Cole is an industry-recognized expert with over 20 years of hands-on experience, founder and an executive leader at Secure Anchor Consulting where he provides leading-edge cybersecurity consulting services, expert witness work, and R&D initiatives to advance our field. Dr. Cole has experience in information technology with a focus on helping customers focus on the right areas of security by building out a dynamic defense. Dr. Cole has a master's degree in computer science from NYIT and a doctorate from Pace University with a concentration in information security. He served as CTO of McAfee and Chief Scientist for Lockheed Martin. Dr. Cole is the author of several books, including Advanced Persistent Threat, Hackers Beware, Hiding in Plain Sight, Network Security Bible 2nd Edition, and Insider Threat. You can connect with Dr Cole on LinkedIn. Chris Martin Chris Martin is the lead EMEA Pre-Sales Solution Architect at Thales. With over 20 years expertise in the IAM space, Chris' extensive background includes Enterprise SSO, PAM, IDaaS and Identity Governance that enables him to bring a holistic approach to enterprise IAM. Within Thales, Chris works alongside our customers to help them define, develop and execute their IAM strategies, either aligning Thales solutions to an existing IAM architecture or building from the ground up. Prior to joining Thales, Chris honed his IAM skills with Sentillion, Centrify, OneLogin, Omada and MicroFocus. You can connect with Chris on LinkedIn.
Jim and Jeff talk with Rod Simmons, Vice President of Product Strategy at Omada, about the role modern IGA plays in a Zero Trust strategy. Connect with Rod on LinkedIn: https://www.linkedin.com/in/rodlsimmons/ Learn about Omada here: https://www.omada.net/ A Modern Approach to Identity Governance and Administration: Securing Remote Work and Supporting Zero Trust Initiatives: https://omadaidentity.com/resources/analyst-reports/esg-modern-iga-report/?success=true Check out Rod's Technology Podcast "SMRPodcast": https://smrpodcast.com/ Connect with Jim and Jeff on LinkedIn here: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show at www.IdentityAtTheCenter.comand follow @IDACPodcast on Twitter. Have a question for Jim and Jeff? Ask us here: https://anchor.fm/identity-at-the-center/message --- Send in a voice message: https://anchor.fm/identity-at-the-center/message
De zesde speciale Business Update met Micro Focus. Ron Lemmens ontving Hero de Haan, Branche Manager New Business bij Strict, en Chris Winter, Senior Solution Consultant bij Micro Focus. Samen gingen ze in gesprek over Identity Governance. Tijdens deze reeks Business Updates onder leiding van Ron Lemmens spreken we een vertegenwoordiger van Micro Focus en een partner. Samen gaan ze discussiëren over verschillende onderwerpen binnen het thema Cyber Resilience. New Business Radio Update New Business Radio maakt speciale updates & podcasts om iedere sector te informeren. De updates worden uitgezonden op New Business Radio en de podcast wordt tevens verspreid via alle bekende podcastkanalen (o.a. Spotify & Apple Podcasts) en social media kanalen. In deze updates hoor je een ander geluid. Los van het traditionele nieuws, hoor je van ondernemers wat er leeft binnen hun bedrijf of sector en delen zij hoe zij hier mee omgaan. Wat voor kansen ontstaan er en hoe kan je als organisatie zo optimaal mogelijk bewegen in een tijd als deze? Tijdens de non-stop uren op New Business Radio hoor je altijd al de meeste interessante updates over innovatie en duurzaamheid. Wat zijn de interessante ontwikkelingen in jouw branche? Wat is er anders? Laat het ons weten! De Business Update op New Business Radio wordt mede mogelijk gemaakt door Hét Ondernemersbelang.
BrightID - Decentralised Identity, Governance and Universal Basic IncomeWith Philip Silva, founding advisor, BrightID Join Piers Ridyard, in this DeFi Download episode, as he interviews Philip Silva, founding advisor of BrightID, which helps you prove your digital uniqueness. Their conversation ranges from explaining the inner workings of BrightID to delving into the feasibility of a cryptocurrency-based UBI, as well as what makes CryptoPunk NFTs so popular.BrightID is a social graph in which you make connections by scanning QR codes. Those connections are made cryptographically. The BrightID team has improved upon robust open-source anti-Sybil analyses algorithms of previous social graphs and integrated them into their system.Phillip Silva is also involved in the LAO, Flamingo DAO, and Neptune, and is a staunch supporter of universal decentralisation.[00:00:46] What is the currently unresolved problem in the world that BrightID is attempting to solve?[00:02:05] From the cypherpunk movement and beyond: How to build a system where you can rely on the attestation without seeing the original information.[00:04:04] BrightID's function and the mechanics of its positive and negative points. What happens when creating a BrightID and how to create one?[00:06:07] How to solve the Sybil problem in a social graph system?[00:09:40] BrightID's present focus and the RabbitHole example, as well as its potential, 10-to-20-year vision and a cryptocurrency-based Universal Basic Income. BrightID's aspiration to provide anti-Sybil solutions for ventures considering UBI experiments.[00:14:53] Artificial intelligence, automation, and the need for Universal Basic Income: New distribution mechanisms within capitalism.[00:19:42] Solutions to the Sybil problem and their limitations, such as weak subjectivity: BrightID's seed-based approach.[00:25:03] The importance of on-ledger identity to governance, which allows associating a key and a vote that is cryptographically verified with something that has an anti-Sybil mechanism. How BrightID views the concept of governance of decentralised autonomous organisations and how the tools at its disposal aid in the operation of such organisations.[00:27:08] Plutocracy within decentralised autonomous organisations and the tyranny of the wealthy: BrightID's response to plutocracy and Gitcoin example.[00:31:20] Philip's involvement with the decentralised autonomous organisations LAO, Flamingo DAO, and Neptune:[00:31:56] LAO (legal autonomous organisation), “the DAO wrapped in a legally compliant manner”[00:36:47] Flamingo DAO, NFTs, and CryptoPunk Aliens[00:41:08] Neptune and Yearn-like algorithmic strategies for yieldFurther resourcesWebsite: brightid.orgTwitter: @BrightIDProjectPhilip Silva's Twitter: @UBIpromoterLAO Website: thelao.io
Everyone has seen or heard of ID management implementations on ServiceNow, especially orchestrating automatic account creation. But how does ID Governance differ and what are the risks if you're not doing it? We ask our very special guest, Jarod Mundt, VP of Engineering at Clear Skye to break it down for us. HINT: It's way bigger and more important than you think!Clear Skye is the premiere ID Governance solution built on ServiceNowCory is a vendor agnostic freelance ServiceNow architect & founder of TekVoyant.Robert is the CXO of VividCharts. Stop spending ludicrous time exporting data off ServiceNow for reporting. TRY NOW.For sponsorship opportunities, click here.
In this episode of the DeFi Download, Piers Ridyard interviews Santiago Siri, founder of Democracy Earth Foundation. Their discussion revolves around the concept of democracy, identity, and new systems of governance and decision-making procedures informed by blockchain protocols and communities that transcend national borders.
31 – IAM - Domain 3 Identity Governance and Administration(IGA)
Sponsored By: Attendees Guest: Arick Goomanovsky Guest title: Co-Founder & Chief Business Officer Company: Ermetic Abstract In cloud platforms, identity and permissions are the most important control that customers get to implement. Network segmentation and other traditional controls are often ineffective and access to resources is determined by a mixture of roles & policies. This mixture can become very complex and difficult to lock down. In this episode, we are hosting Arick Goomanovsky, Chief Business Officer at Ermetic, to discuss Cloud identity and access challenges, and to review real life examples of what can happen when neglecting identity and access entitlements in cloud infrastructure. Mail to: info@ermetic.com Timing: 0:00 Introducing our guest and Ermetic 2:21 Understanding Identity Governance 4:40 Cloud identity challenges 10:55 Dealing with identity challenges by adding visualization and analysis of permissions 16:30 Who are the organizational stakeholders relevant? 22:01 Examples for IAM challenges and outbreaks 22:25 Example 1: Protecting sensitive resources 26:25 Example 2: Third party access 29:49 Example 3: The visibility challenge when using SSO 31:30 Summary and final words
We are now living in a COVID-19 world and the perfect storm that it has created has brought up lots of issues including economic ones, and Identity Governance is now being seen as one of the main solutions. I talk to Ben Bulpett the EMEA marketing Director of SailPoint about this, what the future landscape will look like and more.