
Sign up to save your podcasts
Or


Summary
In this episode of the Blue Security Podcast, hosts Andy and Adam discuss the Security Maturity Model, focusing on identity security. They explore the current state of security practices, identifying areas where organizations may be behind the curve, on track, or ahead of the curve in their security measures. Key topics include the importance of multi-factor authentication (MFA), the transition to passwordless authentication, and the need for robust governance and privileged access management. The conversation emphasizes the necessity of evolving security practices to keep pace with emerging threats and technologies.
----------------------------------------------------
YouTube Video Link: https://youtu.be/oDIN9jD1TCM
----------------------------------------------------
Documentation:
https://learn.microsoft.com/en-us/entra/architecture/secure-best-practices
----------------------------------------------------
Contact Us:
Website: https://bluesecuritypod.com
Bluesky: https://bsky.app/profile/bluesecuritypod.com
LinkedIn: https://www.linkedin.com/company/bluesecpod
YouTube: https://www.youtube.com/c/BlueSecurityPodcast
-----------------------------------------------------------
Andy Jaw
Bluesky: https://bsky.app/profile/ajawzero.com
LinkedIn: https://www.linkedin.com/in/andyjaw/
Email: [email protected]
----------------------------------------------------
Adam Brewer
Twitter: https://twitter.com/ajbrewer
LinkedIn: https://www.linkedin.com/in/adamjbrewer/
Email: [email protected]
By Andy Jaw & Adam Brewer4.7
1515 ratings
Summary
In this episode of the Blue Security Podcast, hosts Andy and Adam discuss the Security Maturity Model, focusing on identity security. They explore the current state of security practices, identifying areas where organizations may be behind the curve, on track, or ahead of the curve in their security measures. Key topics include the importance of multi-factor authentication (MFA), the transition to passwordless authentication, and the need for robust governance and privileged access management. The conversation emphasizes the necessity of evolving security practices to keep pace with emerging threats and technologies.
----------------------------------------------------
YouTube Video Link: https://youtu.be/oDIN9jD1TCM
----------------------------------------------------
Documentation:
https://learn.microsoft.com/en-us/entra/architecture/secure-best-practices
----------------------------------------------------
Contact Us:
Website: https://bluesecuritypod.com
Bluesky: https://bsky.app/profile/bluesecuritypod.com
LinkedIn: https://www.linkedin.com/company/bluesecpod
YouTube: https://www.youtube.com/c/BlueSecurityPodcast
-----------------------------------------------------------
Andy Jaw
Bluesky: https://bsky.app/profile/ajawzero.com
LinkedIn: https://www.linkedin.com/in/andyjaw/
Email: [email protected]
----------------------------------------------------
Adam Brewer
Twitter: https://twitter.com/ajbrewer
LinkedIn: https://www.linkedin.com/in/adamjbrewer/
Email: [email protected]

4,803 Listeners

9,724 Listeners

2,011 Listeners

1,649 Listeners

372 Listeners

371 Listeners

651 Listeners

1,028 Listeners

317 Listeners

66 Listeners

175 Listeners

73 Listeners

24 Listeners

139 Listeners

5 Listeners