

Identity at the Center
Identity at the Center
Identity at the Center is a weekly podcast all about identity security in the context of identity and access management (IAM). With decades of real-world IAM experience, hosts Jim McDonald and Jeff Steadman bring you conversations with news, topics, and guests from the identity management industry. Do you know who has access to what?
Episodes
Mentioned books

Dec 13, 2019 • 48min
Identity At The Center #25 - 2019 Gartner IAM Summit Recap
Hosts reflect on their adventures at the Gartner IAM Summit in Las Vegas. They share insights from a keynote on multitasking's limits and discuss the importance of context in consulting. Highlights include effective communication strategies for IAM with executives and emerging trends in Continuous Adaptive Risk and Trust (CARTA). They explore the evolution of Privileged Access Management, the ongoing vendor landscape changes, and the necessity for IAM professionals to adapt to DevOps. The conversation rounds out with lesser-known IAM products to keep an eye on.

Dec 6, 2019 • 40min
Identity At The Center #24 - Gartner IAM Summit Preview
Jim and Jeff gear up for the Gartner IAM Summit in Las Vegas, sharing tips for navigating the venue and conference logistics. They delve into session selection strategies, emphasizing a mix of familiar and new topics. Core IAM discussions include authentication trends and the IGA Magic Quadrant. The duo also explores decentralized identity and practical enterprise use cases. Networking takes precedence over strict schedules, and they recommend essential vendor sessions for insights and learning. Finally, they offer dining and hotel tips to enhance the conference experience.

Nov 29, 2019 • 42min
Identity At The Center #23 - A Very IAM Thanksgiving
Jim and Jeff celebrate Thanksgiving by sharing what they appreciate in identity and access management. They reflect on IAM's evolution over the years and emphasize new market leaders like Okta and SailPoint. The hosts discuss the importance of multi-factor authentication and the push toward passwordless solutions. They highlight the value of strategic IAM programs and the need for access reviews as best practices. The conversation also touches on seamless integrations and the convenience of cross-save features in gaming.

14 snips
Nov 22, 2019 • 37min
Identity At The Center #22 - Creating An IAM Strategy
Jim and Jeff dive into the intricacies of crafting effective IAM strategies and the key players involved. They highlight the financial justifications that can bolster IAM programs while cautioning against the pitfalls of stopgap solutions. The conversation shifts to the role of IAM in customer data and its potential to drive revenue. Privacy trends and decentralized identity shape their discussion, emphasizing the need for clear communication and stakeholder buy-in. Finally, they advocate for IAM as a continuous program rather than a one-time project.

Nov 15, 2019 • 44min
Identity At The Center #21 - Blockchain with Mike from idRamp
In this discussion, Mike Vesey, an identity practitioner from idRamp, unpacks the world of blockchain-based identity solutions. He breaks down how digital credentials and wallets can replace physical IDs with a unique analogy. Mike explains how conflicting credential data is handled using proof requests and dives into the roles of stewards in ensuring trust. He highlights international adoption, the importance of governance, and how decentralized credentials can ease the load on traditional IAM systems. Finally, he contrasts credential-based access with outdated password systems, envisioning a smoother future for digital identity.

Nov 8, 2019 • 43min
Identity At The Center #20 - IGA Product Trends
Jim and Jeff dive into the latest IGA product trends, discussing the role of AI in enhancing analytics over mere access upselling. They explore the potential of chatbots in automating access requests and approvals, while highlighting the risks of 'model after' requests. The duo critiques role mining, favoring clear, human-understandable roles, and advocates for API-first designs for better user experience. They also emphasize the importance of managing non-employee identities and offer insights on improving SSO integration for seamless access requests.

Nov 1, 2019 • 39min
Identity At The Center #19 - IAM Family Feud with the Identropy Team
In a lively twist, the Identropy team engages in a hilarious IAM-themed Family Feud. Contestants discuss common mistakes in IAM implementation and reveal the most popular weak passwords like 'admin'. A humorous debate ensues about what kind of alcoholic beverage Identropy would be, with favorites like bourbon and martini surfacing. They also explore how to measure IAM effectiveness and share quirky fears when visiting clients. The fun culminates with actors imagined for their CEO, showcasing the team’s creativity and camaraderie.

Oct 25, 2019 • 39min
Identity At The Center #18: IAM Surprises
Jim and Jeff dive into surprising insights from their consulting careers. They share fun anecdotes about exceptional client snacks and the perks of remote work. The duo debates the balance between user experience and loss prevention in self-checkout systems. They also discuss how one client excelled in privileged access management after a security incident. Plus, they offer valuable career advice for aspiring IAM professionals and explore the complexities of integrating open source and legacy systems.

Oct 18, 2019 • 39min
Identity At The Center #17: The 2019 Gartner IGA Magic Quadrant
Discover the insights from the latest Gartner Identity Governance & Administration Magic Quadrant. The hosts analyze the top players like SailPoint, Saviynt, and Omada, highlighting their strengths and strategies. They discuss the absence of Microsoft and how that might affect the landscape. Predictions about emerging vendors and the future of provisioning toward open standards add intrigue. Plus, learn how analytics and machine learning are set to reshape identity governance!

Oct 11, 2019 • 37min
Identity At The Center #16: The IAM Garbage Plate
Jim and Jeff serve up a metaphorical garbage plate of IAM topics inspired by their Rochester visit. They debate using ITSM tools for access requests while addressing the shortcomings of ITSM in identity governance. Key elements of an effective access catalog are outlined, and the importance of business ownership over access decisions is emphasized. They also tackle challenges like Active Directory migrations and the necessity of automating entitlement onboarding. Amidst this, they stress the critical role of IAM in mitigating breach risks.


