Identity at the Center

Identity at the Center
undefined
9 snips
Aug 2, 2019 • 29min

Identity At The Center #5: What Just Left Your Wallet?

Jim and Jeff dive into the Capital One data breach, exploring the staggering number of records affected and the possible motivations behind the attack. They discuss the misconfiguration that allowed hackers to exploit vulnerabilities. The hosts investigate the background of the alleged perpetrator and ponder whether the attack was driven by financial gain or notoriety. They also shed light on how hackers operate, the importance of breach notifications, and caution listeners against potential phishing scams that could exploit the situation.
undefined
89 snips
Jul 26, 2019 • 31min

Identity At The Center #4: The Circle of (IGA) Life

Discover the lifecycle of identity governance, exploring the stages of approval, provisioning, collection, and verification. The hosts dive into the challenges of managing identities in diverse user populations, emphasizing structured approval processes and risk management. They also highlight the balancing act needed between automation and manual provisioning. Security risks tied to legacy accounts are discussed, alongside the importance of real-time analytics for effective access management. Tune in for insights on enhancing identity management practices!
undefined
20 snips
Jul 19, 2019 • 33min

Identity At The Center #3: Healthcare IAM, MFA, and PAM Oh My!

Jim and Jeff dive into healthcare cybersecurity, tackling why many organizations are slow to adopt multi-factor authentication (MFA). They discuss the confidence gap in security despite rising breaches and explore usability concerns around MFA. The duo debates whether to prioritize MFA or Privileged Access Management (PAM), weighing the pros and cons of social logins and passwordless options. They share strategies for rolling out PAM and ensuring minimum controls, offering practical insights for enhancing patient portal security.
undefined
9 snips
Jul 12, 2019 • 31min

Identity At The Center #2: Getting into the sexy world of IAM

Fletcher Eddington, an account executive at Identropy with seven years in IAM, shares his journey from intern to sales professional. He emphasizes the importance of attracting young talent to tackle future UI challenges in identity management. Fletcher discusses common customer concerns like automation and risk mitigation while advocating for incremental IAM implementations. He also explores how organizational silos hinder security effectiveness and highlights the need for improved design in IAM interfaces to enhance user experience.
undefined
45 snips
Jul 2, 2019 • 38min

Identity At The Center #1: Introduction to an IAM Strategy Framework

Deep dive into IAM strategies with hosts Jim McDonald and Jeff Steadman, discussing unconventional paths to success in IAM, the comprehensive nature of IAM beyond technology, crafting effective IAM strategies, and articulating the value of IAM programs for budget support.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app