Identity in Cybersecurity Podcast

Through a Holistic Lens with Joni Brennan


Listen Later

“It's important to look at context and risk when you're deciding what kind of authentication or how strongly a person, or device, or organization needs to be identified.”

In this episode host Ian L. Paterson chats with Joni Brennan about the field of identity management, the importance of context and risk, and the blending of context between personal and professional and what that means for identity.

Topics covered

  • The human impact of identity management. 
  • Classification, access, and trustworthiness of data in the public sector, enterprise, and consumer space.
  • Standards roles in interoperability—plug and play solutions. 
  • Looking at challenges and opportunities holistically—being flexible, willing to experiment with new technologies, yet being pragmatic in terms of decision making, and where to invest.
  •  Importance of context and risk when it comes to authenticating people or devices.
  • Focusing on the integrity of data, who has access to the data, and for which purpose. 
  • The importance of data strategy and classifying kinds of data and understanding which kinds of data need to be verified for which kinds of transactions

Guest Bio
Joni has 15 years of hands-on experience in Identity Access Management innovations and industry standards development. Joni helps the DIACC to fulfill its vision of organizing Canadian market forces to unlock digital identity and authentication economic opportunities for all Canadians. She has participated in international organizational committees and has testified regarding trusted Identity and Access Management systems for the US Office of the National Coordinator for Health Information Technology Security and Privacy.

Guest Links
https://ca.linkedin.com/in/jonibrennan

Plurilock Links
Follow Along: Newsletter | Facebook | Twitter | LinkedIn
Read Along: Click here for full transcript.

...more
View all episodesView all episodes
Download on the App Store

Identity in Cybersecurity PodcastBy Ian L. Paterson