Identity at the Center

#292 - Roadmaps and Realities: Developing an IAM Strategy


Listen Later

In this special 5-year anniversary episode of the Identity at the Center podcast, hosts Jeff and Jim dive deep into the ongoing debate between centralized and decentralized identity management. They discuss key concepts such as single sign-on, the importance of evaluating and questioning identity management strategies, and the need to balance usability with security. The episode also covers the importance of having an IAM strategy and roadmap, detailing the steps to create, assess, develop recommendations, build a roadmap, and communicate effectively. They share personal insights, funny behind-the-scenes stories, and emphasize the value of community support. The episode concludes with Jim and Jeff looking forward to the future of the podcast and thanking their listeners for their continued engagement.

00:00 Introduction and Greetings

00:25 Centralized vs Decentralized Identity Management
03:19 Risk-Based Approach to Identity Management
05:10 The IAM Submarine Analogy
06:40 Podcast Milestones and Community Engagement
08:37 Reflections on Podcast Journey
16:47 Developing an IAM Strategy
33:02 The Magic Number: Why Three is Key
33:12 Grouping Recommendations into Projects
35:21 The Importance of Strategy Over Tactics
36:22 Creating and Implementing a Roadmap
37:59 Customizing Your Roadmap for Your Organization
42:39 Prioritizing and Communicating Your Strategy
49:03 Maintaining Momentum and Adjusting the Roadmap
55:09 Behind the Scenes: Podcast Production Insights

Attending Identity Week in Europe, America, or Asia? Use our discount code IDAC30 for 30% off your registration fee! Learn more at:

  • Europe: https://www.terrapinn.com/exhibition/identity-week/
  • America: https://www.terrapinn.com/exhibition/identity-week-america
  • Asia: https://www.terrapinn.com/exhibition/identity-week-asia/
  • Connect with us on LinkedIn:

    Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/

    Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/

    Visit the show on the web at http://idacpodcast.com and watch at https://www.youtube.com/@idacpodcast

    🔑 Episode Keywords

    Identity Management, Iam Strategy, Identity Governance, Centralized Vs Decentralized, Single Sign-On, Multi-Factor Authentication, Iam Roadmap, Identity Practitioners, Risk-Based Approach, Iam Submarine, Iam Policies, Iam Program, Iam Assessment, Iam Recommendations, Iam Strategy Framework, Identity Security, Iam Technology, Iam Implementation, Identity Lifecycle, Iam Trends

    ...more
    View all episodesView all episodes
    Download on the App Store

    Identity at the CenterBy Identity at the Center

    • 5
    • 5
    • 5
    • 5
    • 5

    5

    37 ratings


    More shows like Identity at the Center

    View all
    Risky Business by Patrick Gray

    Risky Business

    360 Listeners

    SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

    SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

    627 Listeners

    Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

    Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

    367 Listeners

    Finding Mastery with Dr. Michael Gervais by Dr. Michael Gervais

    Finding Mastery with Dr. Michael Gervais

    1,655 Listeners

    Acquired by Ben Gilbert and David Rosenthal

    Acquired

    3,900 Listeners

    Odd Lots by Bloomberg

    Odd Lots

    1,778 Listeners

    CyberWire Daily by N2K Networks

    CyberWire Daily

    1,006 Listeners

    Darknet Diaries by Jack Rhysider

    Darknet Diaries

    7,864 Listeners

    Cybersecurity Today by Jim Love

    Cybersecurity Today

    168 Listeners

    CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

    CISO Series Podcast

    187 Listeners

    Hacking Humans by N2K Networks

    Hacking Humans

    314 Listeners

    Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

    Defense in Depth

    74 Listeners

    Throughline by NPR

    Throughline

    15,954 Listeners

    Cyber Security Headlines by CISO Series

    Cyber Security Headlines

    127 Listeners

    Risky Bulletin by risky.biz

    Risky Bulletin

    33 Listeners