Security architectures depend on identity—the “new security boundary.” Yet despite investment in identity and attempts to drive a sustainable identity culture, significant security breaches and friction still exist, given competing priorities and views on value. In this session of the HIP Podcast, Sean revisits his chat with Denis Ontiveros Merlo, originally recorded during a Hybrid Identity Protection Conference. Join Sean and Denis as they delve into the challenges of creating a sustainable identity culture. Is the identity profession designing products that promote the right user behavior? By using behavioral economics and heuristics—rules of thumb or mental shortcuts to make a quick decision—are we focusing on the wrong problems and reinforcing cognitive bias? Denis presents some examples of anti-patterns to consider when tackling visible operational identity issues.
This episode features Heather Costa, Director of Technology Resilience at Mayo Clinic. A leading voice in organizational resilience, Heather has …
This episode features Dr. Chase Cunningham, Chief Strategy Officer at Demo-Force.com. Widely known as “Dr. Zero Trust”, he’s the creator …
This episode features Jonathon Mayor, Principal Security Consultant for the Americas at Cohesity. A founding member of Cohesity’s Security Center of …
This episode features Chris Inglis, former U.S. National Cyber Director and longtime Deputy Director of the NSA. With over 40 years …
This episode features Jake Hildreth, Principal Security Consultant at Semperis. With nearly 25 years of IT experience, Jake has seen how …
This episode features Ed Amoroso, CEO of TAG Infosphere and former AT&T Chief Security Officer. With decades of experience securing complex …
Sean is joined by identity expert Sander Berkouwer to explore the evolving landscape of enterprise authentication. Active Directory Federation Services …
The 2017 NotPetya cyberattack remains one of the most devastating and costly breaches in history, inflicting over $1.4 billion in …
In this time of constant cyberattacks and increased cybersecurity reporting requirements, a CISO's job is no easy task and typically …
How is IAM—and the role of the identity security professional—adapting to meet the challenges of today's threat landscape? In this …
Thanks for subscribing!