Podcasts

Prefer to listen to your Identity news?  Click on the individual podcasts below or scroll further to browse all the newest podcasts to find what interests you.  Note – you won’t see the Identity Unlocked podcast in the newsfeed because our friend Vittorio has left us – but his voice and his insight are unrivaled even now, please listen and enjoy.

Identity at the Center
Hybrid Identity Protection
Identity Unlocked
  • #310 - Personhood Credentials with Eve Maler

    In this episode of the Identity at the Center podcast, Jim McDonald is joined by Eve Maler to explore a provocative topic—"Consent is Dead." Eve shares insights from her recent keynote at the European Identity and Cloud Conference (EIC) in Berlin, where she unpacked the failures of consent-based systems in protecting user privacy. They discuss why the "I agree" button has lost its meaning, even in regions with strong data protection laws like GDPR, and how users' personal information is monetized through identity resolution technologies. Eve reveals how identity professionals often overlook the world of identity resolution, which operates without a direct relationship with users. She emphasizes the importance of IAM professionals understanding the deep monetization of personal data and the critical need to improve systems of privacy, consent, and security. They also touch on the role of AI in authorization decisions and the balance between explainability and automation in future IAM systems. Chapters 00:00 Introduction and Context 03:01 Eve Maler's Journey in Identity 09:53 Exploring Personhood and Verifiable Credentials 12:52 Identity Verification and AI Threats 25:13 The State of Consent in Digital Identity 30:42 GDPR and Its Implications 39:53 The Future of AI in IAM 45:05 AuthZen Working Group Update 55:23 Non-Human Identities and IoT 01:02:52 Closing Thoughts and Future Directions 01:04:03 Fingerprint City Outro.mp4 Connect with Eve: https://www.linkedin.com/in/evemaler/ Venn Factory: https://www.vennfactory.com/ Personhood: The Killer Credential? (blog by Eve): https://workshop.vennfactory.com/p/personhood-the-killer-credential Death and the Digital Estate (blog by Eve): https://workshop.vennfactory.com/p/death-and-the-digital-estate From Chance to Control (blog by Eve): https://workshop.vennfactory.com/p/from-chance-to-control Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at http://idacpodcast.com and watch at https://www.youtube.com/@idacpodcast

  • #309 - IDAC Sponsor Spotlight - Token Security

    In this Token Identity sponsored episode of the Identity at the Center podcast, hosts Jeff and Jim welcome Ido Shlomo, co-founder and CTO of Token Security, to discuss the vital and often overlooked topic of non-human identities or machine identities within organizations. The conversation covers how machine identities differ from human identities, the unique challenges they pose, and how Token Security aims to address these issues. Ido shares his personal journey into the cyber-security field, real-life case studies, and details about Token Security's approach to managing and securing machine identities. The episode also delves into the implementation and ROI of their solution and touches on lighter topics like online gaming. 00:00 Welcome to the Identity at the Center Podcast 03:14 Guest Introduction: Ido Shlomo from Token Security 03:35 Ido Shlomo's Journey into Identity Security 06:04 Understanding Token Security's Mission 07:37 Challenges in Machine Identity Management 10:08 Defining Non-Human Identity 11:32 The Story Behind Token Security's Name 13:35 Token Security's Unique Value Proposition 20:20 Real-Life Case Study: The Importance of Non-Human Identity Security 22:05 Narrowing Down the Machines 22:15 Identifying the Compromised Machine 22:26 GitHub Report and API Key 22:34 Event Resolution and Success 22:39 Human vs Non-Human Identity 22:56 Technology Differences and Case Study 23:23 Implementing the Solution 23:46 Philosophy of Software Development 24:28 Integration and Deployment 26:09 Building an Inventory 26:31 Reducing Risk and Lifecycle Process 28:05 Attribution and Data Collection 30:02 Learning More and ROI 34:22 Online Gaming and Personal Insights 34:47 Gaming Personas and Preferences 36:34 Gaming Memories and Character Classes 40:33 Wrapping Up and Final Thoughts Connect with Ido: https://www.linkedin.com/in/ido--shlomo/ Learn more about Token Security: https://www.token.security/?utm_medium=idac&utm_source=website&utm_campaign=Sep_podcast&utm_content=sponsor_page Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at idacpodcast.com and watch at https://www.youtube.com/@idacpodcast

  • #308 - The Business Case for IAM with IDPro Andre Koot

    In this episode of the Identity at the Center podcast, Jeff and Jim discuss how to make the business case for IAM and determining the return on investment (ROI). Joined by Andre Koot, they delve into the need for a compelling business case to drive IAM investments. The conversation covers the quantitative and qualitative aspects of ROI, and the importance of stakeholder communication. 00:00 Welcome to the Identity at the Center Podcast 01:39 Training and Professional Development in IAM 03:58 Upcoming Conferences and Events 07:51 The Business Case for IAM 12:51 IAM: Financial and Non-Financial Perspectives 23:08 Calculating Return on Investment in IAM 28:59 Hard Dollars vs. Soft Dollars 30:11 Dollarizing Non-Savings Benefits 31:40 Challenges in ROI Calculations 34:07 Quantifiable vs. Non-Quantifiable Benefits 37:14 ROI in Different Organizational Contexts 39:50 Insourcing vs. Outsourcing 49:02 Communicating ROI Effectively 54:10 Language Nuances and Cultural Context 01:01:35 Conclusion and Final Thoughts Connect with Andre: https://www.linkedin.com/in/meneer/ The Business Case for IAM (IDPro): https://bok.idpro.org/article/id/97/ Strategic Alignment and Access Governance (IDPro): ****https://bok.idpro.org/article/id/90/ Authenticate Conference - Use code IDAC15 for 15% off: https://authenticatecon.com/event/authenticate-2024-conference/ SailPoint Navigate - October 21-24 in Orlando, FL - Use code IDAC for a $400 discount Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at http://idacpodcast.com and watch at https://www.youtube.com/@idacpodcast

  • Recovering Entra ID Resources and Data with Tuna Gezer

    Following a cyber incident that compromises Entra ID, an inability to recover critical objects and conditional access policies can bring your business recovery to a standstill. In this episode, Sean talks with Tuna Gezer, Senior Product Manager for Semperis Disaster Recovery for Entra Tenant (DRET), about how Entra ID data recovery differs from on-premises Active Directory. Microsoft is responsible for getting your Entra tenant back online, but not for restoring hard-deleted data—a resource-intensive, time-consuming process. Don’t be caught unprepared; listen to this episode for this important discussion.Want more great HIP content? Register for this year's Hybrid Identity Protection Conference! Find HIP Conf 24 in New Orleans, November 13-14. BONUS: HIP Podcast listeners get a special 20% discount off HIP Conf 24 tickets! Use promo code HIPConfPod. Register now at https://register.hipconf.com/event/1b968c66-a916-4330-a5a3-577cc76dcc6b/summary.

  • #307 - Creating an IAM Program

    In this comprehensive episode of the Identity at the Center podcast, hosts Jeff and Jim explore the foundations and sustainability of effective Identity and Access Management (IAM) programs. They delve into the essential elements of setting up an IAM program, including the importance of executive buy-in, phased implementation strategies, the significance of governance, and adapting to evolving business needs. The discussion also emphasizes the need for continuous enhancements and future-proofing IAM systems by budgeting for updates and choosing dependable managed service partners. Practical advice is offered throughout, ensuring listeners have the tools to start and maintain a successful IAM program. The episode wraps up with a recap of ten crucial steps for IAM implementation and lighter conversations about recent personal trips. 00:00 Introduction and Podcast Setup 01:30 Technical Difficulties and Recording Challenges 04:23 Conferences and Upcoming Events 05:55 Starting an IAM Program 10:34 Assessing Current IAM Capabilities 22:37 Building a Cross-Functional IAM Team 30:56 Choosing the Right IAM Technology 43:02 Starting with Phase One 43:44 Planning for Compliance and Cyber Insurance 46:25 User Experience in IAM Implementation 49:18 Workforce vs. Customer Identity Management 57:46 Governance, Policies, and Metrics 01:09:31 Maintaining and Evolving IAM Programs 01:16:03 Final Thoughts and Recap Authenticate Conference - Use code IDAC15 for 15% off: https://authenticatecon.com/event/authenticate-2024-conference/ Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at http://idacpodcast.com and watch at https://www.youtube.com/@idacpodcast

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.