
Sign up to save your podcasts
Or


Security architectures depend on identity—the “new security boundary.” Yet despite investment in identity and attempts to drive a sustainable identity culture, significant security breaches and friction still exist, given competing priorities and views on value. In this session of the HIP Podcast, Sean revisits his chat with Denis Ontiveros Merlo, originally recorded during a Hybrid Identity Protection Conference. Join Sean and Denis as they delve into the challenges of creating a sustainable identity culture. Is the identity profession designing products that promote the right user behavior? By using behavioral economics and heuristics—rules of thumb or mental shortcuts to make a quick decision—are we focusing on the wrong problems and reinforcing cognitive bias? Denis presents some examples of anti-patterns to consider when tackling visible operational identity issues.
By Semperis5
33 ratings
Security architectures depend on identity—the “new security boundary.” Yet despite investment in identity and attempts to drive a sustainable identity culture, significant security breaches and friction still exist, given competing priorities and views on value. In this session of the HIP Podcast, Sean revisits his chat with Denis Ontiveros Merlo, originally recorded during a Hybrid Identity Protection Conference. Join Sean and Denis as they delve into the challenges of creating a sustainable identity culture. Is the identity profession designing products that promote the right user behavior? By using behavioral economics and heuristics—rules of thumb or mental shortcuts to make a quick decision—are we focusing on the wrong problems and reinforcing cognitive bias? Denis presents some examples of anti-patterns to consider when tackling visible operational identity issues.

881 Listeners

376 Listeners

83 Listeners

652 Listeners

1,020 Listeners

64 Listeners

8,017 Listeners

40 Listeners

38 Listeners

23 Listeners

136 Listeners

15 Listeners

22 Listeners

46 Listeners

5 Listeners