Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Identity at the Center. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Identity at the Center or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

#339 - Sponsor Spotlight - Permiso

56:38
 
Share
 

Manage episode 473436971 series 3201233
Content provided by Identity at the Center. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Identity at the Center or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

This episode is sponsored by Permiso. Visit permiso.io/idac to learn more.

In this sponsored episode of the Identity at the Center Podcast, hosts Jeff and Jim sit down with Paul Nguyen, co-founder and co-CEO of Permiso, to discuss the critical role of identity security in modern information security. Paul shares insights into the history of identity threats, the rise of identity-focused attacks like Scattered Spider and LLM Jacking, and the importance of real-time identity monitoring for both human and non-human identities across cloud and on-prem environments. The episode explores how Permiso is positioned in the market to provide comprehensive identity threat detection and response (ITDR) and identity security posture management (ISPM), offering advanced visibility and proactive measures against emerging threats.

Chapters

00:00 Introduction to Security Vendors

00:50 Welcome to the Identity at the Center Podcast

01:30 Sponsored Spotlight: Permiso

02:14 Meet Paul Nguyen, Co-Founder of Permiso

03:34 The Importance of Identity in Security

05:35 Permiso's Unique Approach to Identity Security

07:36 Real-Time Monitoring and Threat Detection

09:23 Challenges and Solutions in Identity Security

15:16 Modern Attacks and Identity Threats

25:56 The Role of Honeypots in Security Research

26:49 Challenges of Maintaining Security

27:15 Honeypots and Breach Detection

27:46 Dwell Time and Reconnaissance

28:34 Password Complexity and Monitoring Gaps

29:24 Roles and Responsibilities in Identity Security

29:49 Unified Identity Security Teams

30:57 Emerging Threats and Joint Efforts

32:49 Permiso's Role in Identity Security

34:10 Detection and Response Strategies

36:11 Managing Identity Risks

36:51 Combining Prevention and Detection

39:44 Real-World Applications and Challenges

51:17 Personal Insights and Final Thoughts

Connect with Paul: https://www.linkedin.com/in/paulnguyen/

Learn more about Permiso: https://permiso.io/idac

Connect with us on LinkedIn:

Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/

Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/

Visit the show on the web at idacpodcast.com and watch at idacpodcast.tv

Keywords:

identity security, real-time monitoring, IAM, cybersecurity, identity exploitation, modern attacks, insider threats, honeypots, organizational structure, Non-Human Identities, Identity Security, Permiso, Risk Management, Insider Threat, Shadow IT, Identity Graph, ITDR, ISPM, Cybersecurity

  continue reading

349 episodes

Artwork
iconShare
 
Manage episode 473436971 series 3201233
Content provided by Identity at the Center. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Identity at the Center or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

This episode is sponsored by Permiso. Visit permiso.io/idac to learn more.

In this sponsored episode of the Identity at the Center Podcast, hosts Jeff and Jim sit down with Paul Nguyen, co-founder and co-CEO of Permiso, to discuss the critical role of identity security in modern information security. Paul shares insights into the history of identity threats, the rise of identity-focused attacks like Scattered Spider and LLM Jacking, and the importance of real-time identity monitoring for both human and non-human identities across cloud and on-prem environments. The episode explores how Permiso is positioned in the market to provide comprehensive identity threat detection and response (ITDR) and identity security posture management (ISPM), offering advanced visibility and proactive measures against emerging threats.

Chapters

00:00 Introduction to Security Vendors

00:50 Welcome to the Identity at the Center Podcast

01:30 Sponsored Spotlight: Permiso

02:14 Meet Paul Nguyen, Co-Founder of Permiso

03:34 The Importance of Identity in Security

05:35 Permiso's Unique Approach to Identity Security

07:36 Real-Time Monitoring and Threat Detection

09:23 Challenges and Solutions in Identity Security

15:16 Modern Attacks and Identity Threats

25:56 The Role of Honeypots in Security Research

26:49 Challenges of Maintaining Security

27:15 Honeypots and Breach Detection

27:46 Dwell Time and Reconnaissance

28:34 Password Complexity and Monitoring Gaps

29:24 Roles and Responsibilities in Identity Security

29:49 Unified Identity Security Teams

30:57 Emerging Threats and Joint Efforts

32:49 Permiso's Role in Identity Security

34:10 Detection and Response Strategies

36:11 Managing Identity Risks

36:51 Combining Prevention and Detection

39:44 Real-World Applications and Challenges

51:17 Personal Insights and Final Thoughts

Connect with Paul: https://www.linkedin.com/in/paulnguyen/

Learn more about Permiso: https://permiso.io/idac

Connect with us on LinkedIn:

Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/

Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/

Visit the show on the web at idacpodcast.com and watch at idacpodcast.tv

Keywords:

identity security, real-time monitoring, IAM, cybersecurity, identity exploitation, modern attacks, insider threats, honeypots, organizational structure, Non-Human Identities, Identity Security, Permiso, Risk Management, Insider Threat, Shadow IT, Identity Graph, ITDR, ISPM, Cybersecurity

  continue reading

349 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Listen to this show while you explore
Play