Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Jody Maberry. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jody Maberry or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

The Final Logoff - Streamlining Secure Departures

21:38
 
Share
 

Manage episode 467897393 series 3647477
Content provided by Jody Maberry. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jody Maberry or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

"Everyone who's part of a health care organization or health care tech has access to really private information. And getting that access removed from somebody who's leaving the organization is key."

Key Moments

02:23 Streamlining Through Automation

05:55 Streamlining Tool Access and Security

08:54 Centralize Identity with Single Sign-On

11:41 Automated Offboarding: Quick and Secure

13:25 Automating Environment-Specific Challenges

17:10 Streamline Access to Protect Data

19:51 Streamlined Process vs. Disorganization

Streamlining secure departures is not just an operational necessity; it's a pivotal component of our organization's security framework. During our latest discussion, we explore how automating the final logoff process can transform the way we handle employee departures. Bill Easton, a skilled staff security engineer at Redox, joins to highlight practices that can enhance our security posture.

The overarching theme is that automation is king. Bill emphasizes that efficient offboarding begins with a central access system integrated with our HR information system. By automating access removal, we significantly reduce the chances of oversight and enhance security resilience. A streamlined, repeatable process ensures no system is left vulnerable due to manual mishaps.

Meghan McLeod highlights the importance of role-based access rather than one-off permissions. This approach not only simplifies automation but also ensures that access can be efficiently managed across various roles within the company.

Bill shared his experience at Redox, where continuous improvement in automation is a priority. Even though achieving full automation is a journey, each step forward makes a difference. We're currently at an 80:20 ratio, and the push for seamless automation continues.

To further safeguard our operations, Bill advises centralizing identity management through single sign-on (SSO). This strategy not only enhances user experience but also fortifies security by consolidating access control.

As we steadily build this framework, let's ensure our team is aligned with these processes and ready to tackle future security challenges with precision and efficiency. As always, it's about locking the back door to safeguard our most sensitive information.

Resources

www.redoxengine.com

Past Podcast Episodes

https://redoxengine.com/solutions/platform-security

Have feedback or a topic suggestion? Submit it using this linked form.

Matt Mock [email protected]

Meghan McLeod [email protected]

  continue reading

15 episodes

Artwork
iconShare
 
Manage episode 467897393 series 3647477
Content provided by Jody Maberry. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jody Maberry or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

"Everyone who's part of a health care organization or health care tech has access to really private information. And getting that access removed from somebody who's leaving the organization is key."

Key Moments

02:23 Streamlining Through Automation

05:55 Streamlining Tool Access and Security

08:54 Centralize Identity with Single Sign-On

11:41 Automated Offboarding: Quick and Secure

13:25 Automating Environment-Specific Challenges

17:10 Streamline Access to Protect Data

19:51 Streamlined Process vs. Disorganization

Streamlining secure departures is not just an operational necessity; it's a pivotal component of our organization's security framework. During our latest discussion, we explore how automating the final logoff process can transform the way we handle employee departures. Bill Easton, a skilled staff security engineer at Redox, joins to highlight practices that can enhance our security posture.

The overarching theme is that automation is king. Bill emphasizes that efficient offboarding begins with a central access system integrated with our HR information system. By automating access removal, we significantly reduce the chances of oversight and enhance security resilience. A streamlined, repeatable process ensures no system is left vulnerable due to manual mishaps.

Meghan McLeod highlights the importance of role-based access rather than one-off permissions. This approach not only simplifies automation but also ensures that access can be efficiently managed across various roles within the company.

Bill shared his experience at Redox, where continuous improvement in automation is a priority. Even though achieving full automation is a journey, each step forward makes a difference. We're currently at an 80:20 ratio, and the push for seamless automation continues.

To further safeguard our operations, Bill advises centralizing identity management through single sign-on (SSO). This strategy not only enhances user experience but also fortifies security by consolidating access control.

As we steadily build this framework, let's ensure our team is aligned with these processes and ready to tackle future security challenges with precision and efficiency. As always, it's about locking the back door to safeguard our most sensitive information.

Resources

www.redoxengine.com

Past Podcast Episodes

https://redoxengine.com/solutions/platform-security

Have feedback or a topic suggestion? Submit it using this linked form.

Matt Mock [email protected]

Meghan McLeod [email protected]

  continue reading

15 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play