Identity at the Center

Identity at the Center
undefined
Mar 9, 2020 • 36min

Identity At The Center #34 - Managing IAM Risk with Esteban

Join Jim, Jeff, and Esteban as they dive into the intricacies of managing IAM risk. Esteban shares his journey from IT operations to security, emphasizing the importance of applying the Three Lines of Defense model. The conversation highlights the balance between security oversight and service delivery, as well as the critical role of monitoring in identifying process breakdowns. They also explore the growing significance of governing non-human accounts, showcasing how identity governance acts as a vital security layer.
undefined
Mar 2, 2020 • 29min

Identity At The Center #33 - IAM for IoT

Explore the complexities of Identity and Access Management (IAM) for Internet of Things devices. The hosts define what constitutes a 'thing' in the IoT landscape, differentiating device identity from human identity. They discuss best practices for device registration and authenticity, emphasizing the importance of separation in identity storage. Topics like machine-to-machine authentication, token usage, and security risks such as firmware vulnerabilities are key highlights. Dive into the challenges of scaling IoT IAM to ensure reliability and security.
undefined
Feb 24, 2020 • 43min

Identity At The Center #32 - Talking IAM with Binod at Ilantus

In this engaging discussion, Binod Singh, the Founder and CEO of Ilantus Technologies, draws on his 20 years of experience in identity and access management (IAM). He explores how IAM has evolved from its early days and the critical role SOX and web access management played in its development. Binod highlights the booming mid-market IAM sector, the impact of cloud technology, and the importance of unifying access management with identity governance. His insights on the bot proliferation and the need for simpler, integrated IAM solutions are particularly eye-opening.
undefined
Feb 17, 2020 • 45min

Identity At The Center #31 - Confusing and Misleading IAM Terms

Join Jim and Jeff as they untangle the often confusing terminology in the world of identity and access management. They delve into the distinctions between internal and external applications, and debate how hybrid tools like Microsoft Teams fit into these categories. Discover the nuances of role definitions in IAM, privileged access, and the differences between single sign-on and simplified sign-on. The discussion also touches on multi-factor authentication and the various meanings of mobile device management, ensuring clarity in this complex field.
undefined
Feb 10, 2020 • 36min

Identity At The Center #30 - Biggest Challenges of CIAM

Dive into the complexities of Consumer Identity and Access Management (CIAM) as Jim and Jeff uncover the challenges organizations face. From mastering delegated administration to enhancing registration processes, they discuss practical solutions to reduce customer churn. Explore the evolving landscape of multi-factor authentication and the advantages of cloud AI in bolstering security. They also share insights on evaluating CIAM platforms and aligning IAM with business strategies, emphasizing the need for collaboration and innovation.
undefined
Feb 3, 2020 • 48min

Identity At The Center #29 - Big Game IAM Chat With Katy, Amanda, and Marcie

The discussion kicks off with a lively debate on whether the 49ers or the Chiefs will triumph in the Super Bowl. Guests share their unique journeys into Identity and Access Management, highlighting the industry's appeal for women. Insights on the evolving landscape of IAM, including the influence of AI and cloud technologies, are explored. The importance of mentorship and training in the field is emphasized, along with the complexities of managing access and relationships within organizations. The team also tackles pressing issues like vendor comparisons and the future of IAM roles.
undefined
15 snips
Jan 27, 2020 • 32min

Identity At The Center #28 - IAM Metrics

Explore the vital role of IAM metrics in cybersecurity and why stakeholder agreement is essential. Discover how to track metrics over time using visualizations, and the importance of compliance metrics for accountability. Learn about access reviews as measurable workflows and the operational value of IAM through onboarding and automation. Delve into maturity models, ongoing investments, and the impact of multi-factor authentication on user experience. Tune in for insights on making IAM metrics effective and tailored for different audiences.
undefined
Jan 20, 2020 • 53min

Identity At The Center #27 - What makes a good IAM Program Manager

In a discussion about what makes an effective IAM program manager, the hosts highlight the balance of technical and business skills essential for success. They stress the importance of having a clear strategy, strong communication, and robust relationships with stakeholders. Personal growth through self-awareness and collaboration with experts is emphasized, alongside the pitfalls of underinvestment in IAM initiatives. The conversation also touches on common mistakes organizations make and the need for long-term planning amidst the rapidly evolving tech landscape.
undefined
Dec 20, 2019 • 26min

Identity At The Center #26 - IAM in Monterrey with Arturo

Arturo Cordoba, Senior Advisor on the Cyber Security team at CEMEX, dives into the challenges and successes of managing identity and access management (IAM) in Monterrey, Mexico. He discusses the significant PEMEX ransomware attack and its impact on the industry. Arturo also highlights his achievement of rolling out multi-factor authentication for 23,000 employees, and the internal politics that can slow IAM progress. He aims to foster a local IAM community to connect professionals and share knowledge, ensuring an informed and robust cybersecurity landscape.
undefined
Dec 13, 2019 • 48min

Identity At The Center #25 - 2019 Gartner IAM Summit Recap

Hosts reflect on their adventures at the Gartner IAM Summit in Las Vegas. They share insights from a keynote on multitasking's limits and discuss the importance of context in consulting. Highlights include effective communication strategies for IAM with executives and emerging trends in Continuous Adaptive Risk and Trust (CARTA). They explore the evolution of Privileged Access Management, the ongoing vendor landscape changes, and the necessity for IAM professionals to adapt to DevOps. The conversation rounds out with lesser-known IAM products to keep an eye on.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app