Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Axiomatics. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Axiomatics or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

#CybersecurityMonth and what’s next for AI, IAM, and authorization - Ep.3

29:13
 
Share
 

Manage episode 412160752 series 3568346
Content provided by Axiomatics. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Axiomatics or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Kelly and David return for another episode of the Dynamically Speaking podcast to discuss the celebration of twenty years of Cybersecurity Awareness Month as well as some of the happenings in the world of access control, including;

  • Some of the major highlights in the last two decades of CSAM
  • The challenges in dealing with prompt bombing
  • The continuing growth of A.I. and how authorization can engage with it
  • The future of Information Access Management (IAM) and authorization

Your hosts
Kelly O'Dwyer-Manuel, VP Brand & Communications
David Brossard, Chief Technology Officer
Connect with us
LinkedIn: https://www.linkedin.com/company/axiomatics
YouTube: https://www.youtube.com/@axiomatics
Learn more about our policy-driven authorization solution
Our solution: https://axiomatics.com/solutions
Book a demo: https://axiomatics.com/demo
Contact us: https://axiomatics.com/contact-us
About Axiomatics
Axiomatics is the originator and leading provider of runtime, fine-grained authorization delivered with attribute-based access control (ABAC) for applications, data, APIs, and microservices. The company’s Orchestrated Authorization strategy enables enterprises to effectively and efficiently connect Axiomatics’ award-winning authorization platform to critical security implementations, such as Zero Trust or identity-first security. The world’s largest enterprises and government agencies continually depend on Axiomatics’ award-winning authorization platform to share sensitive, valuable, and regulated digital assets – but only to authorized users and in the right context. Please visit our website or follow us on LinkedIn and YouTube to learn more.

Text us your comments or questions on this episode

  continue reading

16 episodes

Artwork
iconShare
 
Manage episode 412160752 series 3568346
Content provided by Axiomatics. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Axiomatics or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Kelly and David return for another episode of the Dynamically Speaking podcast to discuss the celebration of twenty years of Cybersecurity Awareness Month as well as some of the happenings in the world of access control, including;

  • Some of the major highlights in the last two decades of CSAM
  • The challenges in dealing with prompt bombing
  • The continuing growth of A.I. and how authorization can engage with it
  • The future of Information Access Management (IAM) and authorization

Your hosts
Kelly O'Dwyer-Manuel, VP Brand & Communications
David Brossard, Chief Technology Officer
Connect with us
LinkedIn: https://www.linkedin.com/company/axiomatics
YouTube: https://www.youtube.com/@axiomatics
Learn more about our policy-driven authorization solution
Our solution: https://axiomatics.com/solutions
Book a demo: https://axiomatics.com/demo
Contact us: https://axiomatics.com/contact-us
About Axiomatics
Axiomatics is the originator and leading provider of runtime, fine-grained authorization delivered with attribute-based access control (ABAC) for applications, data, APIs, and microservices. The company’s Orchestrated Authorization strategy enables enterprises to effectively and efficiently connect Axiomatics’ award-winning authorization platform to critical security implementations, such as Zero Trust or identity-first security. The world’s largest enterprises and government agencies continually depend on Axiomatics’ award-winning authorization platform to share sensitive, valuable, and regulated digital assets – but only to authorized users and in the right context. Please visit our website or follow us on LinkedIn and YouTube to learn more.

Text us your comments or questions on this episode

  continue reading

16 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play