This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
Content provided by Anton Chuvakin. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Anton Chuvakin or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!
Go offline with the Player FM app!
EP218 IAM in the Cloud & AI Era: Navigating Evolution, Challenges, and the Rise of ITDR/ISPM
MP3•Episode home
Manage episode 475630055 series 2892548
Content provided by Anton Chuvakin. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Anton Chuvakin or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Guest:
- Henrique Teixeira, Senior VP of Strategy, Saviynt, ex-Gartner analyst
Topics:
- How have you seen IAM evolve over the years, especially with the shift to the cloud, and now AI? What are some of the biggest challenges and opportunities these two shifts present?
- ITDR (Identity Threat Detection and Response) and ISPM (Identity Security Posture Management) are emerging areas in IAM. How do you see these fitting into the overall IAM landscape? Are they truly distinct categories or just extensions of existing IAM practices?
- Shouldn’t ITDR just be part of your Cloud DR or maybe even your SecOps tool of choice? It seems goofy to try to stand ITDR on its own when the impact of an identity compromise is entirely a function of what that identity can access or do, no?
- Regarding workload vs. human identity, could you elaborate on the unique security considerations for each? How does the rise of machine identities and APIs impact IAM approaches?
- We had a whole episode around machine identity that involved turtles–what have you seen in the machine identity space and how have you seen users mess it up?
- The cybersecurity world is full of acronyms. Any tips on how to create a memorable and impactful acronym?
Resources:
- EP166 Workload Identity, Zero Trust and SPIFFE (Also Turtles!)
- EP182 ITDR: The Missing Piece in Your Security Puzzle or Yet Another Tool to Buy?
- EP127 Is IAM Really Fun and How to Stay Ahead of the Curve in Cloud IAM?
- EP94 Meet Cloud Security Acronyms with Anna Belak
- EP162 IAM in the Cloud: What it Means to Do It 'Right' with Kat Traxler
- EP199 Your Cloud IAM Top Pet Peeves (and How to Fix Them)
- EP188 Beyond the Buzzwords: Identity's True Role in Cloud and SaaS Security
- “Playing to Win: How Strategy Really Works” book
- “Open” book
230 episodes
MP3•Episode home
Manage episode 475630055 series 2892548
Content provided by Anton Chuvakin. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Anton Chuvakin or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Guest:
- Henrique Teixeira, Senior VP of Strategy, Saviynt, ex-Gartner analyst
Topics:
- How have you seen IAM evolve over the years, especially with the shift to the cloud, and now AI? What are some of the biggest challenges and opportunities these two shifts present?
- ITDR (Identity Threat Detection and Response) and ISPM (Identity Security Posture Management) are emerging areas in IAM. How do you see these fitting into the overall IAM landscape? Are they truly distinct categories or just extensions of existing IAM practices?
- Shouldn’t ITDR just be part of your Cloud DR or maybe even your SecOps tool of choice? It seems goofy to try to stand ITDR on its own when the impact of an identity compromise is entirely a function of what that identity can access or do, no?
- Regarding workload vs. human identity, could you elaborate on the unique security considerations for each? How does the rise of machine identities and APIs impact IAM approaches?
- We had a whole episode around machine identity that involved turtles–what have you seen in the machine identity space and how have you seen users mess it up?
- The cybersecurity world is full of acronyms. Any tips on how to create a memorable and impactful acronym?
Resources:
- EP166 Workload Identity, Zero Trust and SPIFFE (Also Turtles!)
- EP182 ITDR: The Missing Piece in Your Security Puzzle or Yet Another Tool to Buy?
- EP127 Is IAM Really Fun and How to Stay Ahead of the Curve in Cloud IAM?
- EP94 Meet Cloud Security Acronyms with Anna Belak
- EP162 IAM in the Cloud: What it Means to Do It 'Right' with Kat Traxler
- EP199 Your Cloud IAM Top Pet Peeves (and How to Fix Them)
- EP188 Beyond the Buzzwords: Identity's True Role in Cloud and SaaS Security
- “Playing to Win: How Strategy Really Works” book
- “Open” book
230 episodes
All episodes
×Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.