This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
محتوای ارائه شده توسط Anton Chuvakin. تمام محتوای پادکست شامل قسمتها، گرافیکها و توضیحات پادکست مستقیماً توسط Anton Chuvakin یا شریک پلتفرم پادکست آنها آپلود و ارائه میشوند. اگر فکر میکنید شخصی بدون اجازه شما از اثر دارای حق نسخهبرداری شما استفاده میکند، میتوانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
Player FM - برنامه پادکست
با برنامه Player FM !
با برنامه Player FM !
EP218 IAM in the Cloud & AI Era: Navigating Evolution, Challenges, and the Rise of ITDR/ISPM
Manage episode 475630055 series 2892548
محتوای ارائه شده توسط Anton Chuvakin. تمام محتوای پادکست شامل قسمتها، گرافیکها و توضیحات پادکست مستقیماً توسط Anton Chuvakin یا شریک پلتفرم پادکست آنها آپلود و ارائه میشوند. اگر فکر میکنید شخصی بدون اجازه شما از اثر دارای حق نسخهبرداری شما استفاده میکند، میتوانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
Guest:
- Henrique Teixeira, Senior VP of Strategy, Saviynt, ex-Gartner analyst
Topics:
- How have you seen IAM evolve over the years, especially with the shift to the cloud, and now AI? What are some of the biggest challenges and opportunities these two shifts present?
- ITDR (Identity Threat Detection and Response) and ISPM (Identity Security Posture Management) are emerging areas in IAM. How do you see these fitting into the overall IAM landscape? Are they truly distinct categories or just extensions of existing IAM practices?
- Shouldn’t ITDR just be part of your Cloud DR or maybe even your SecOps tool of choice? It seems goofy to try to stand ITDR on its own when the impact of an identity compromise is entirely a function of what that identity can access or do, no?
- Regarding workload vs. human identity, could you elaborate on the unique security considerations for each? How does the rise of machine identities and APIs impact IAM approaches?
- We had a whole episode around machine identity that involved turtles–what have you seen in the machine identity space and how have you seen users mess it up?
- The cybersecurity world is full of acronyms. Any tips on how to create a memorable and impactful acronym?
Resources:
- EP166 Workload Identity, Zero Trust and SPIFFE (Also Turtles!)
- EP182 ITDR: The Missing Piece in Your Security Puzzle or Yet Another Tool to Buy?
- EP127 Is IAM Really Fun and How to Stay Ahead of the Curve in Cloud IAM?
- EP94 Meet Cloud Security Acronyms with Anna Belak
- EP162 IAM in the Cloud: What it Means to Do It 'Right' with Kat Traxler
- EP199 Your Cloud IAM Top Pet Peeves (and How to Fix Them)
- EP188 Beyond the Buzzwords: Identity's True Role in Cloud and SaaS Security
- “Playing to Win: How Strategy Really Works” book
- “Open” book
231 قسمت
Manage episode 475630055 series 2892548
محتوای ارائه شده توسط Anton Chuvakin. تمام محتوای پادکست شامل قسمتها، گرافیکها و توضیحات پادکست مستقیماً توسط Anton Chuvakin یا شریک پلتفرم پادکست آنها آپلود و ارائه میشوند. اگر فکر میکنید شخصی بدون اجازه شما از اثر دارای حق نسخهبرداری شما استفاده میکند، میتوانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
Guest:
- Henrique Teixeira, Senior VP of Strategy, Saviynt, ex-Gartner analyst
Topics:
- How have you seen IAM evolve over the years, especially with the shift to the cloud, and now AI? What are some of the biggest challenges and opportunities these two shifts present?
- ITDR (Identity Threat Detection and Response) and ISPM (Identity Security Posture Management) are emerging areas in IAM. How do you see these fitting into the overall IAM landscape? Are they truly distinct categories or just extensions of existing IAM practices?
- Shouldn’t ITDR just be part of your Cloud DR or maybe even your SecOps tool of choice? It seems goofy to try to stand ITDR on its own when the impact of an identity compromise is entirely a function of what that identity can access or do, no?
- Regarding workload vs. human identity, could you elaborate on the unique security considerations for each? How does the rise of machine identities and APIs impact IAM approaches?
- We had a whole episode around machine identity that involved turtles–what have you seen in the machine identity space and how have you seen users mess it up?
- The cybersecurity world is full of acronyms. Any tips on how to create a memorable and impactful acronym?
Resources:
- EP166 Workload Identity, Zero Trust and SPIFFE (Also Turtles!)
- EP182 ITDR: The Missing Piece in Your Security Puzzle or Yet Another Tool to Buy?
- EP127 Is IAM Really Fun and How to Stay Ahead of the Curve in Cloud IAM?
- EP94 Meet Cloud Security Acronyms with Anna Belak
- EP162 IAM in the Cloud: What it Means to Do It 'Right' with Kat Traxler
- EP199 Your Cloud IAM Top Pet Peeves (and How to Fix Them)
- EP188 Beyond the Buzzwords: Identity's True Role in Cloud and SaaS Security
- “Playing to Win: How Strategy Really Works” book
- “Open” book
231 قسمت
همه قسمت ها
×به Player FM خوش آمدید!
Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.