
Sign up to save your podcasts
Or
Chris: What do you think some of the fundamental changes of IAM are from on-prem to cloud?
Chris: What are some of the key tradeoffs and considerations for using IDaaS offerings?
Nikki: There are a lot of solutions out there that discuss zero trust as a product or a service that can be leveraged to 'bake in' zero trust into an environment. But I'm curious on your perspective - do you think we need additional tools to configure zero trust principles, or leverage the technology at hand to implement zero trust?
Nikki: There's this move towards passwordless solutions - I can see that being a big boost to zero trust architectures, but I think we're still missing the need for trusted identities, whether it's passwords, pins, or tokens. How do you feel about the passwordless movement and do you think more products will move in that direction?
Chris: You've been a part of the FICAM group and efforts in the CIO Council. Can you tell us a bit about that and where it is headed?
Chris: It is said Identity is the new perimeter in the age of Zero Trust, why do you think this is and how can organizations address it?
Nikki: There was an interesting research publication I read, titled "Beyond zero trust: Trust is a vulnerability" by M. Campbell in the IEEE Computer journal. I like the idea of considering zero trust principles, like least privilege, or limited permissions, as potential vulnerabilities instead of security controls. Do you think the language is important when discussing vulnerabilities versus security controls?
Chris: What role do you think NPE's play in the modern threat landscape?
Chris: If people want to learn more about the Federal FICAM/ZT Strategies, where do you recommend they begin?
4.9
1515 ratings
Chris: What do you think some of the fundamental changes of IAM are from on-prem to cloud?
Chris: What are some of the key tradeoffs and considerations for using IDaaS offerings?
Nikki: There are a lot of solutions out there that discuss zero trust as a product or a service that can be leveraged to 'bake in' zero trust into an environment. But I'm curious on your perspective - do you think we need additional tools to configure zero trust principles, or leverage the technology at hand to implement zero trust?
Nikki: There's this move towards passwordless solutions - I can see that being a big boost to zero trust architectures, but I think we're still missing the need for trusted identities, whether it's passwords, pins, or tokens. How do you feel about the passwordless movement and do you think more products will move in that direction?
Chris: You've been a part of the FICAM group and efforts in the CIO Council. Can you tell us a bit about that and where it is headed?
Chris: It is said Identity is the new perimeter in the age of Zero Trust, why do you think this is and how can organizations address it?
Nikki: There was an interesting research publication I read, titled "Beyond zero trust: Trust is a vulnerability" by M. Campbell in the IEEE Computer journal. I like the idea of considering zero trust principles, like least privilege, or limited permissions, as potential vulnerabilities instead of security controls. Do you think the language is important when discussing vulnerabilities versus security controls?
Chris: What role do you think NPE's play in the modern threat landscape?
Chris: If people want to learn more about the Federal FICAM/ZT Strategies, where do you recommend they begin?
628 Listeners
152 Listeners
1,007 Listeners
203 Listeners
7,869 Listeners
170 Listeners
187 Listeners
56 Listeners
129 Listeners
48 Listeners
15,256 Listeners
33 Listeners
122 Listeners
4 Listeners
34 Listeners