Identity at the Center

Identity at the Center
undefined
Dec 13, 2019 • 48min

Identity At The Center #25 - 2019 Gartner IAM Summit Recap

Hosts reflect on their adventures at the Gartner IAM Summit in Las Vegas. They share insights from a keynote on multitasking's limits and discuss the importance of context in consulting. Highlights include effective communication strategies for IAM with executives and emerging trends in Continuous Adaptive Risk and Trust (CARTA). They explore the evolution of Privileged Access Management, the ongoing vendor landscape changes, and the necessity for IAM professionals to adapt to DevOps. The conversation rounds out with lesser-known IAM products to keep an eye on.
undefined
Dec 6, 2019 • 40min

Identity At The Center #24 - Gartner IAM Summit Preview

Jim and Jeff gear up for the Gartner IAM Summit in Las Vegas, sharing tips for navigating the venue and conference logistics. They delve into session selection strategies, emphasizing a mix of familiar and new topics. Core IAM discussions include authentication trends and the IGA Magic Quadrant. The duo also explores decentralized identity and practical enterprise use cases. Networking takes precedence over strict schedules, and they recommend essential vendor sessions for insights and learning. Finally, they offer dining and hotel tips to enhance the conference experience.
undefined
Nov 29, 2019 • 42min

Identity At The Center #23 - A Very IAM Thanksgiving

Jim and Jeff celebrate Thanksgiving by sharing what they appreciate in identity and access management. They reflect on IAM's evolution over the years and emphasize new market leaders like Okta and SailPoint. The hosts discuss the importance of multi-factor authentication and the push toward passwordless solutions. They highlight the value of strategic IAM programs and the need for access reviews as best practices. The conversation also touches on seamless integrations and the convenience of cross-save features in gaming.
undefined
14 snips
Nov 22, 2019 • 37min

Identity At The Center #22 - Creating An IAM Strategy

Jim and Jeff dive into the intricacies of crafting effective IAM strategies and the key players involved. They highlight the financial justifications that can bolster IAM programs while cautioning against the pitfalls of stopgap solutions. The conversation shifts to the role of IAM in customer data and its potential to drive revenue. Privacy trends and decentralized identity shape their discussion, emphasizing the need for clear communication and stakeholder buy-in. Finally, they advocate for IAM as a continuous program rather than a one-time project.
undefined
Nov 15, 2019 • 44min

Identity At The Center #21 - Blockchain with Mike from idRamp

In this discussion, Mike Vesey, an identity practitioner from idRamp, unpacks the world of blockchain-based identity solutions. He breaks down how digital credentials and wallets can replace physical IDs with a unique analogy. Mike explains how conflicting credential data is handled using proof requests and dives into the roles of stewards in ensuring trust. He highlights international adoption, the importance of governance, and how decentralized credentials can ease the load on traditional IAM systems. Finally, he contrasts credential-based access with outdated password systems, envisioning a smoother future for digital identity.
undefined
Nov 8, 2019 • 43min

Identity At The Center #20 - IGA Product Trends

Jim and Jeff dive into the latest IGA product trends, discussing the role of AI in enhancing analytics over mere access upselling. They explore the potential of chatbots in automating access requests and approvals, while highlighting the risks of 'model after' requests. The duo critiques role mining, favoring clear, human-understandable roles, and advocates for API-first designs for better user experience. They also emphasize the importance of managing non-employee identities and offer insights on improving SSO integration for seamless access requests.
undefined
Nov 1, 2019 • 39min

Identity At The Center #19 - IAM Family Feud with the Identropy Team

In a lively twist, the Identropy team engages in a hilarious IAM-themed Family Feud. Contestants discuss common mistakes in IAM implementation and reveal the most popular weak passwords like 'admin'. A humorous debate ensues about what kind of alcoholic beverage Identropy would be, with favorites like bourbon and martini surfacing. They also explore how to measure IAM effectiveness and share quirky fears when visiting clients. The fun culminates with actors imagined for their CEO, showcasing the team’s creativity and camaraderie.
undefined
Oct 25, 2019 • 39min

Identity At The Center #18: IAM Surprises

Jim and Jeff dive into surprising insights from their consulting careers. They share fun anecdotes about exceptional client snacks and the perks of remote work. The duo debates the balance between user experience and loss prevention in self-checkout systems. They also discuss how one client excelled in privileged access management after a security incident. Plus, they offer valuable career advice for aspiring IAM professionals and explore the complexities of integrating open source and legacy systems.
undefined
Oct 18, 2019 • 39min

Identity At The Center #17: The 2019 Gartner IGA Magic Quadrant

Discover the insights from the latest Gartner Identity Governance & Administration Magic Quadrant. The hosts analyze the top players like SailPoint, Saviynt, and Omada, highlighting their strengths and strategies. They discuss the absence of Microsoft and how that might affect the landscape. Predictions about emerging vendors and the future of provisioning toward open standards add intrigue. Plus, learn how analytics and machine learning are set to reshape identity governance!
undefined
Oct 11, 2019 • 37min

Identity At The Center #16: The IAM Garbage Plate

Jim and Jeff serve up a metaphorical garbage plate of IAM topics inspired by their Rochester visit. They debate using ITSM tools for access requests while addressing the shortcomings of ITSM in identity governance. Key elements of an effective access catalog are outlined, and the importance of business ownership over access decisions is emphasized. They also tackle challenges like Active Directory migrations and the necessity of automating entitlement onboarding. Amidst this, they stress the critical role of IAM in mitigating breach risks.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app