Share EY NextGen IAM
Share to email
Share to Facebook
Share to X
By EY Cybersecurity
5
1313 ratings
The podcast currently has 6 episodes available.
The concept of Zero Trust has been around for the past decade with varying degrees of adoption. During this podcast, Ajit, Ankan, and Michael discuss the shift from perimeter defense mindset to assumed breach. Our speakers discuss common pitfalls and enablers across the six pillars of Zero Trust: Identity, Data, Application, Network, Devices and Infrastructure. This episode also explores the different elements across people, process, technology and culture needed for a Zero Trust journey.
We use our identity each day, and often more times than we realize. We use our identity to shop online, submit tax returns and even logon for a day’s work. Each of these require a separate identity and the need to remember passwords, and a separate registration process.
What if we could merge these and have a shared ID instead of having different credentials? The good news is that blockchain has enabled a new way to solve this problem through constructs like verifiable credentials (VCs) and the ability to orchestrate identity verification across the network. In this episode, David Chan, Ernst & Young LLP, speaks with Ankur Patel, Microsoft – Identity Products Lead and Rob Foster, Ernst & Young LLP, about how DIDs (decentralized identities) can improve the user experience and streamline identity management processes.
Secrets are a company’s “keys to the kingdom.” This is especially true as companies increase their footprint in the cloud environment. In fact, many of the top data breaches can be ascribed to the lack of secrets management. Traditional IAM tools may also no longer be enough to manage secrets especially in a cloud environment where resources are ephemeral. When thinking about the type of solution you want to implement among secrets management, some initial questions you need to ask are – what business problem are you trying to solve and how does it align with your broader IT and business objectives?
Host David Chan, Ernst & Young LLP Cyber IAM Managing Director, is joined by our guest Ayo Ewebiyi, Ernst & Young LLP Cyber IAM Senior Manager, and one of our key technical leaders in the space, to help us think through the problem and to discuss real-world lessons learned on the topic.
Join us in a discussion around cloud access governance and Gap, Inc.’s multi-cloud identity and access management (IAM) journey. We speak about its challenges and how to leverage tools such as cloud infrastructure entitlement management. Hosted by David Chan, Ernst & Young LLP managing director, and guests Ankan Sharma, Ernst & Young LLP senior manager, and Sriram Santhanam, Gap, Inc. director of IAM.
Join us in a discussion around cloud access governance and Gap, Inc.’s multi-cloud identity and access management (IAM) journey. We speak about its challenges and how to leverage tools such as cloud infrastructure entitlement management. Hosted by David Chan, Ernst & Young LLP managing director, and guests Ankan Sharma, Ernst & Young LLP senior manager, and Sriram Santhanam, Gap, Inc. director of IAM.
Each employee password reset costs an average of $70. How many times have you reset your password this year? The number of passwords we're managing continues to grow as our digital identities become more complex, so how do we keep our credentials secure? Today we're talking about the pathway to the future - passwordless authentication.
Join our host, Sam Tang, EY's Cyber Chief Identity Architect, guest speakers Rob Foster, EY Cybersecurity Senior Manager and George Muldoon, HYPR Global Alliance Leader and subject matter resource in passwordless authentication in their discussion on common obstacles and cutting-edge solutions when using passwords.
The podcast currently has 6 episodes available.