Identity at the Center-logo

Identity at the Center

Technology Podcasts

Identity at the Center is a weekly podcast all about identity security in the context of identity and access management (IAM). With decades of real-world IAM experience, hosts Jim McDonald and Jeff Steadman bring you conversations with news, topics, and guests from the identity management industry. Do you know who has access to what?

Location:

United States

Description:

Identity at the Center is a weekly podcast all about identity security in the context of identity and access management (IAM). With decades of real-world IAM experience, hosts Jim McDonald and Jeff Steadman bring you conversations with news, topics, and guests from the identity management industry. Do you know who has access to what?

Language:

English


Episodes
Ask host to enable sharing for playback control

#406 - IDAC MailBag for February 2026

3/9/2026
In this MailBag episode, Jeff Steadman and Jim McDonald tackle eight questions submitted by listeners from around the world, including Munich, Sao Paulo, Singapore, Toronto, Hanoi, London, Sydney, and Chicago. The conversation covers governing AI and non-human identities, practical first steps toward passwordless adoption, what a mature IAM program actually looks like, who should own identity within an organization, building credibility with leadership as a new IAM practitioner, enforcing least privilege in practice, rethinking access reviews beyond checkbox compliance, and how to make the business case for identity security investment before a breach occurs. The episode wraps up with some lighter listener questions about sports analogies for IAM roles and whether anyone in their personal lives actually understands what they do for a living. Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at http://idacpodcast.com TIMESTAMPS 00:00 - Introduction and RSA Conference debate 03:41 - Conference plans for 2026: EIC, Identiverse, and Authenticate 05:17 - MailBag intro and how questions get selected 06:51 - Q1 (Hans, Munich): Governing AI access vs. human access — same principles or a different approach? 12:32 - Q2 (Gabriela, Sao Paulo): Realistic first steps toward passwordless without disrupting everything 18:34 - Q3 (Wei, Singapore): What does a mature identity program actually look like? 30:26 - Q4 (Marcus, Toronto): When IT and security both claim to own identity, how do you sort it out? 39:33 - Q5 (Linh, Hanoi): Building credibility and influence as someone new to the IAM space 42:53 - Q6 (Claire, London): Enforcing least privilege in practice without slowing down the business 46:14 - Q7 (James, Sydney): Are access reviews just a checkbox exercise, and is there a better way? 49:18 - Q8 (Darnell, Chicago): Making the case to a CFO or CEO for identity security investment before a breach 52:38 - Lighter note: If IAM was a sport, what position would you play? 1:00:27 - Lighter note: Does your family actually understand what you do? 1:03:06 - Wrap-up and how to submit future questions KEYWORDS IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, IAM, identity and access management, MailBag, non-human identity, AI governance, agentic AI, passwordless, passkeys, IAM program maturity, identity ownership, RACI, least privilege, zero standing privilege, access reviews, security theater, identity security budget, business case for IAM, ISPM, IGA, IDPro, Identiverse, EIC, Authenticate conference, RSA conference, cybersecurity podcast, identity security, identity community

Duration:01:04:22

Ask host to enable sharing for playback control

#405 - RSM 2026 Attack Vectors Report

3/2/2026
Jeff and Jim sit down with David Llorens, principal at RSM, to break down the RSM 2026 Attack Vectors Report. Drawing from real-world offensive security engagements, David explains why identity continues to be the primary attack surface, how AI chatbots are creating new vulnerabilities through prompt injection, and what separates organizations that get breached from those that don't. The conversation covers MFA gaps, the explosion of non-human identities, why PAM is the top investment priority for 2026, and how CISOs can align security spending with business objectives. Plus, the episode wraps up with soccer stories and some quality trash talk. Connect with David: https://www.linkedin.com/in/david-llorens-009a3310/ Review RSM’s 2026 Attack Vectors Report: https://rsmus.com/insights/services/risk-fraud-cybersecurity/rsm-attack-vector-report.html Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at http://idacpodcast.com TIMESTAMPS0:00 - Intro and Jim's big personal news4:51 - Main topic intro: RSM 2026 Attack Vectors Report5:55 - David's origin story and how he got into cybersecurity9:53 - What a principal is at RSM and David's current role11:16 - What the Attack Vectors Report is and how it is created14:40 - Why identity security is a dominant theme in this year's report17:19 - What separates organizations that get breached from those that don't18:18 - MFA as the first line of defense18:45 - Privileged access management as a growing priority19:40 - Detecting lateral movement through identity anomalies21:00 - Credential rotation as an advanced defensive technique22:26 - Non-human identities and service account risks24:37 - Middle market challenges and budget constraints25:17 - Is it the size of the budget or how you spend it?28:29 - Using internal audit and cross-department collaboration for security wins30:15 - Cybersecurity as a business enabler, not a deterrent32:45 - Non-human identities and agentic AI creating new attack surfaces35:51 - Prompt injection attacks and AI chatbot vulnerabilities39:42 - Actionable recommendations for practitioners42:41 - MFA implementation gaps and session hijacking45:02 - The case for FIDO2 and layered conditional access46:35 - Is identity security a board-level issue?49:47 - Three things CISOs should focus on through 202650:52 - PAM as the top investment priority51:28 - Removing unnecessary privileges from users56:11 - Redefining what privilege means in your organization57:43 - Social media accounts as privileged access58:42 - Credentials stored in SharePoint and OneDrive59:38 - Wrap up and where to find the report59:58 - Lighter topic: David's soccer background and playing semi-pro1:05:06 - Best trash talk stories1:07:03 - Jim's trash talk philosophy: scoreboard1:08:00 - Jeff's basketball trash talk and calling his shots1:10:00 - Final thoughts and sign off KEYWORDSIDAC, Identity at the Center, Jeff Steadman, Jim McDonald, David Llorens, RSM, attack vectors report, offensive security, penetration testing, identity security, MFA, multifactor authentication, privileged access management, PAM, non-human identities, service accounts, agentic AI, AI security, prompt injection, lateral movement, credential rotation, FIDO2, conditional access, session hijacking, middle market, CISO, board-level security, certificate-based authentication, active directory, configuration management, shadow AI

Duration:01:11:24

Ask host to enable sharing for playback control

#404 - Sponsor Spotlight - Bravura Security

2/25/2026
This episode is sponsored by Bravura Security. Learn more at bravurasecurity.com/idac. This is a Sponsor Spotlight episode of the Identity at the Center podcast. Jim McDonald and Jeff Steadman are joined by Bart Allan, General Manager at Bravura Security, to discuss why enterprise password management remains a critical piece of identity security even as organizations pursue passwordless strategies. Bart shares Bravura's history dating back to 1992, starting with self-service password reset and evolving into a full identity security platform spanning identity management, privileged access management, and enterprise password management. The conversation digs into the uncomfortable truth that while organizations may get 80% of their applications onto modern authentication, the remaining 20% still rely on passwords, creating real security risk. Bart explains how treating enterprise passwords the way organizations treat privileged credentials, with automated rotation and centralized management, can remove the human element from password creation and reduce exposure to breaches and social engineering. The group also discusses help desk social engineering attacks, breach recovery challenges, deployment strategies for rolling out an enterprise password manager, and the emerging role of password managers as passkey managers for portability. The episode wraps with some outdoor adventure stories from Bart and Jim. Connect with Bart: https://www.linkedin.com/in/bartholomewallan/ Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at idacpodcast.com TIMESTAMPS00:00 - Introduction and welcome01:00 - Sponsor Spotlight overview and Bravura Security introduction01:52 - Bart Allan's background in identity03:30 - History of Bravura Security from 1992 to today05:39 - How the Bravura name came to be07:00 - What makes Bravura unique in the identity market08:33 - Why password management still matters09:58 - The uncomfortable truth about passwords and the 80/20 problem13:00 - Personal vs enterprise password managers16:00 - The last mile to passwordless and legacy systems19:00 - Why storing passwords is not enough without active management22:00 - Help desk social engineering and the human element25:00 - Breach response and the fog of war31:00 - Scattered spider scenarios and credential reset at scale35:00 - Is a password manager the only viable option for the final 20%?38:00 - The future of password managers as passkey managers40:00 - Tips for deploying an enterprise password manager42:45 - Measuring success with an enterprise password manager45:17 - Lighter side of the conversation begins46:00 - Bart's backcountry skiing avalanche story from Rogers Pass50:30 - Jim's lightning storm story from backpacking in Yosemite52:53 - Final thoughts from Bart on the passwordless journey54:00 - Wrap up and outro KEYWORDSIDAC, Identity at the Center, Jeff Steadman, Jim McDonald, Bravura Security, Bart Allan, password management, enterprise password manager, passwordless, passkeys, privileged access management, identity security, help desk social engineering, breach recovery, credential rotation, self-service password reset, identity verification, IAM operations, shadow IT, FIDO, sponsor spotlight, password vault, legacy systems

Duration:00:55:02

Ask host to enable sharing for playback control

#403 - Strategic Identity Security with Simon Moffatt

2/23/2026
Simon Moffatt, founder and analyst at The Cyber Hut and co-host of The Analyst Brief podcast, returns to Identity at the Center for a wide-ranging conversation about the strategic evolution of identity security. Simon shares an update on his second book, IAM at 2035, which explores where identity is heading over the next decade. The discussion covers why identity has shifted from a back office function to a strategic business enabler, driven by the convergence of cloud, zero trust, and expanding digital ecosystems.Jim and Jeff dig into how organizations can measure their identity security posture, and Simon introduces his Identity Security Scorecard, a framework of 50-plus data points covering visibility, protection, detection, and response. The conversation shifts to the identity attack lifecycle, where Simon explains why organizations need to move beyond log-based forensics and toward real-time detection and response before attacks complete.The group also explores how non-identity data signals, like CAEP and shared signals frameworks, are critical to building a fuller picture of risk. The final segment tackles agentic AI and its implications for identity, including the argument that agentic identities may represent a third identity type distinct from both human and machine. Simon makes the case that AI adoption is outpacing identity and security innovation, creating a widening gap that the industry must address through governance, accountability, and new architectural patterns. Connect with Simon: https://www.linkedin.com/in/simonmoffatt/ The Analyst Brief Podcast: https://www.thecyberhut.com/podcast/ Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at http://idacpodcast.com Timestamps00:00 Introduction and conference discount codes02:29 Simon Moffatt returns to the show03:58 Update on the IAM at 2035 book07:25 The Analyst Brief podcast and covering identity trends08:44 Identity shifts from back office to strategic priority11:47 The compliance trap and reactionary identity management14:25 Customer identity transparency influencing workforce identity16:52 Defining identity security across 80-plus vendors20:11 Products alone do not solve identity security21:14 Thinking like an attacker about identity flows23:23 Red flags in an organization's identity posture25:43 The identity security scorecard and measuring risk29:27 Avoiding FUD when presenting identity risk to the board32:34 The identity attack lifecycle explained36:53 Building the mindset for real-time detection and response37:41 CAEP, shared signals, and non-identity data sources40:10 Identity as a 24/7 security operations function43:24 Agentic AI drops like a nuclear explosion on identity46:49 The widening gap between AI adoption and identity security47:51 Is agentic identity a third identity type?50:47 What needs to change to address the agentic identity explosion53:24 Will AI shake the core of enterprise IT?57:24 AI may be the only thing that can secure AI58:04 Travel tips for EIC Berlin and European conferences01:02:45 Wrapping up Keywordsidentity security, identity attack lifecycle, identity attack paths, agentic AI, agentic identity, non-human identity, NHI, identity security scorecard, zero trust, CAEP, shared signals framework, identity governance, identity strategy, IAM, identity posture, Simon Moffatt, The Cyber Hut, The Analyst Brief, IDAC, Identity at the Center, Jeff Steadman, Jim McDonald

Duration:01:04:07

Ask host to enable sharing for playback control

#402 - An Update on SSF and CAEP with Atul Tulshibagwale

2/16/2026
In this episode of Identity at the Center, hosts Jeff and Jim dive into the details of the Shared Signals Framework (SSF) and Continuous Access Evaluation Profile (CAEP), with special guest Atul Tulshibagwale, the CTO of Signal. The trio discusses the complexities and applications of these identity security standards, recent adoption by major tech companies, and how they are transforming the approach towards identity and access management. Atul also shares exciting news about Signal's impending acquisition by CrowdStrike and reflects on a recent safari trip in Kenya. Tune in to learn about the evolution of identity security and the future of SSF and CAEP. Connect with Atul: https://www.linkedin.com/in/tulshi/ Learn more about the Artificial Intelligence Identity Management Community Group: https://openid.net/cg/artificial-intelligence-identity-management-community-group/ Learn more about SSF and CAEP: https://openid.net/how-authzen-and-shared-signals-caep-complement-each-other/https://sgnl.ai/whitepaper/caep-best-practices/https://caep.dev/https://youtu.be/qakOw0g2mZ8?si=p8z9imn7x-HhLdcVhttps://www.youtube.com/live/e64YiAmGmf4?si=QPKDg2Jm9oSZmbhZhttp://sharedsignals.guide/ Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at http://idacpodcast.com Timestamps: 00:00 Introduction and Episode Milestone 00:17 Challenges with Installing Molt Bot 02:32 MoltBook and AI Agents 03:21 Jim's Perspective on AI Assistants 09:24 Conferences and Networking 10:10 Introduction to Shared Signals and CAEP 13:03 CrowdStrike Acquisition of Signal 14:03 AI Identity Management Community 16:59 Shared Signals Framework and CAEP Explained 30:03 Final Version of CAEP and Shared Signals Released 30:35 Adoption by Major Technology Providers 32:49 Benefits of Implementing Shared Signals 36:32 Future of SSF and CAEP 40:51 Certification Program for Shared Signals 52:48 Real-World Safari Adventure 01:00:34 Conclusion and Final Thoughts Keywords: IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, Atul Tulshibagwale, Shared Signals Framework, SSF, CAEP, Continuous Access Evaluation Profile, OpenID Foundation, CrowdStrike, SGNL AI Identity, Agentic Identity, AuthZEN, Risk, Identity Security, IAM, Podcast

Duration:01:01:56

Ask host to enable sharing for playback control

#401 - Sponsor Spotlight - PlainID

2/11/2026
This episode is sponsored by PlainID. Visit plainid.com/idac to learn more. In this sponsored episode, Jim McDonald and Jeff Steadman talk with Gal Helemski, CTO and co-founder of PlainID, about the evolving landscape of authorization. The conversation covers the transition from traditional roles and attributes to a modern policy-based access control (PBAC) approach. Gal explains how PlainID helps organizations centralize authorization logic, improve security posture, and simplify the management of access across complex hybrid and multi-cloud environments. The discussion also touches on the importance of visibility into who has access to what and the role of standards like Cedar and Rego in the future of authorization. Connect with Gal: https://www.linkedin.com/in/gal-helemski-b9542231/Learn more about PlainID: plainid.com/idac Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at idacpodcast.com Timestamps: 00:00 Introduction to the Sponsor Spotlight 02:15 Meet Gal Helemski from PlainID 05:30 The shift from RBAC to PBAC 10:45 Challenges with traditional authorization methods 15:20 How PlainID centralizes authorization logic 22:10 Integrating with existing identity providers 28:45 The role of visibility and auditing in authorization 35:30 Discussion on authorization standards: Cedar and Rego 42:15 Future trends in identity and access management 50:00 Final thoughts and where to learn more Keywords: IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, PlainID, Authorization, Policy-Based Access Control, PBAC, RBAC, Cybersecurity, IAM, Access Management, Gal Helemski, Identity Security

Duration:00:52:11

Ask host to enable sharing for playback control

#400 - Celebrating 400 episodes of IDAC

2/9/2026
In this milestone episode of Identity at the Center, Jeff and Jim celebrate 400 episodes and reflect on their journey over the past six and a half years. They discuss the podcast’s evolution, from its early days focusing on strategy and framework to recent themes like cloud identity, governance, and AI-driven technologies. Jim shares his New Year's resolution of writing a book about identity, blending practitioner stories with educational elements, and utilizing AI tools. The duo also highlights significant trends in identity and access management, including frictionless authentication and privilege access management. They look forward to the future of identity within an AI-driven landscape, urging listeners to adapt to technological advancements. Tune in for insights, reflections, and their plans for continuing to grow the podcast. Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at http://idacpodcast.com Timestamps 00:00 Welcome and Milestone Celebration00:44 Reflecting on the Podcast Journey01:27 Jim's New Year's Resolution: Writing a Book05:16 Using AI in the Writing Process09:34 Podcast Growth and Listener Support13:08 Remembering Luis Almeida16:59 Conference Highlights and Discount Codes19:05 Lessons Learned from Podcasting29:01 The Evolution of the Podcast36:01 Pandemic Disruptions and Podcast Challenges36:30 Funny Moments and Swearing on the Show37:24 Identity Management Trends in 202039:20 Cloud Identity and Certifications in 202141:54 Governance and Compliance in 202244:23 Security Convergence and Milestones in 202351:07 Privilege Access Management in 202455:15 Frictionless Authentication in 202558:20 AI and the Future of Identity in 202601:09:00 Reflections and Gratitude Keywords: IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, IAM, podcast, cybersecurity, digital identity, AI, agentic identity, PAM, IGA, cloud security, passkeys, professional development, IDPro, identity governance

Duration:01:11:39

Ask host to enable sharing for playback control

#399 - Navigating Identity Security in the Age of AI with Jeff Margolies

2/5/2026
Jim McDonald is joined by Jeff Margolies, Chief Product and Strategy Officer at Saviynt, to discuss the intersection of artificial intelligence and identity security. Jeff shares his decades of experience in the industry, from building the IAM practice at Accenture to his current leadership role at Saviynt. The conversation covers how AI is making manually intensive identity tasks more efficient, the emergence of Identity Security Posture Management (ISPM), and the critical need to govern identities for AI agents. Jeff also provides his perspective on the future of the identity practitioner and why he remains an optimist in a rapidly changing technological landscape. Connect with Jeff Margolies on LinkedIn: https://www.linkedin.com/in/jmargolies/ Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at http://idacpodcast.com Timestamps: 00:00:00 - Introduction and Gartner Identity Conference Recap 00:02:11 - Jeff Margolies' Career Journey in Identity and Security 00:04:36 - Returning to Identity and Joining Saviynt 00:06:13 - How AI is Impacting Identity Security and Governance 00:09:56 - The Future of Identity Services in an AI World 00:13:58 - Will AI Disrupt the SaaS Model for Identity? 00:19:50 - The Impact of AI on the Identity Practitioner Job Market 00:26:16 - Identity for AI: Governing Agents and Delegated Authority 00:32:00 - Combating Deepfakes and Proving What is Real 00:34:40 - The Rise of Identity Security Posture Management (ISPM) 00:41:46 - Comparing Posture Management and ITDR 00:44:17 - Advice for CISOs: Why Posture Should Come First 00:49:35 - The Secret to Saviynt's Success and Future Outlook 00:52:19 - Lighter Note: Why Jeff Chose a Tesla for His Daughter Keywords: IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, Jeff Margolies, Saviynt, IAM, Identity and Access Management, AI, Artificial Intelligence, ISPM, ITDR, Cybersecurity, Identity Governance, SaaS, IGA

Duration:00:56:55

Ask host to enable sharing for playback control

#398 - Solving the AI Identity Challenge with Martin Kuppinger

2/2/2026
In this episode, Jim McDonald welcomes back Martin Kuppinger, Principal Analyst at KuppingerCole, to discuss the rapidly evolving landscape of identity in 2026. With Jeff Steadman away, Jim and Martin dive deep into the intellectual challenges posed by AI agents and the limitations of traditional non-human identity frameworks. Martin explains why organizations are feeling a sense of disillusionment with AI and how a capability-based identity fabric approach can help manage the complexity. They also explore the balance between security and business enablement, the rise of workload identities, and what to expect at the upcoming European Identity and Cloud Conference (EIC) in Berlin. Connect with Martin: https://www.linkedin.com/in/martinkuppinger/ KuppingerCole: https://www.kuppingercole.com European Identity and Cloud Conference (EIC) (don’t forget to use our discount code idac25mko): https://www.kuppingercole.com/events/eic2026 Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at http://idacpodcast.com Timestamps 00:00 - Welcome back to 2026 and EIC preparations 02:48 - The shift from future potential to current AI agent challenges 03:12 - Understanding AI disillusionment and the lack of control in regulated industries 05:19 - Security as a business enabler vs progress prevention 09:55 - Why AI agents should not be classified simply as non-human identities 11:43 - Complex relationships between humans, agents, and delegated tasks 15:17 - Self-service identity for knowledge workers and AI productivity 18:40 - The risks of decentralized agent creation and "shadow" AI 21:58 - How AI is being baked into identity products beyond role mining 26:55 - Using usage data to reduce over-entitlements 34:10 - The Identity Fabric: A capability-based approach to IAM 40:33 - Vendor rationalization and the flexibility of the fabric 47:19 - Previewing EIC 2026 topics: Wallet initiatives and consent 52:44 - Final advice: Curing symptoms vs addressing causes Keywords: IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, Martin Kuppinger, KuppingerCole, IAM, AI Agents, Identity Fabric, EIC 2026, Non-Human Identity, Workload Identity, ITDR, IGA, Cybersecurity

Duration:00:55:33

Ask host to enable sharing for playback control

#397 - RSM & IDAC Present - The Intersection of Resiliency, Recovery, and IAM

1/26/2026
Jeff Steadman is joined by RSM colleagues Rich Servillas and Charles John to explore the critical intersection of identity access management, operational resilience, and disaster recovery. Rich, a director from the cyber response group, shares insights from the front lines of ransomware and cloud intrusions, while Chuck, director of operational resilience, discusses the importance of business continuity planning. The conversation covers the true impact of security incidents on brand reputation and operations, the necessity of out-of-band communication, and why identity is often the first thing challenged and the last thing trusted during a crisis. The guests also provide practical advice for IAM professionals on reducing blast radius through standing privilege reduction and robust logging. Connect with Rich: https://www.linkedin.com/in/richard-servillas-041a0551/ Connect with Chuck: https://www.linkedin.com/in/chuckjohn/ Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at http://idacpodcast.com Timestamps: 00:00:00 - Introduction and 2026 conference outlook 00:01:44 - Introducing guests Rich and Chuck from RSM 00:03:56 - Defining operational resilience and business continuity 00:06:22 - When and how to start the planning process 00:09:55 - Chuck's background in public health and emergency management 00:12:44 - The broad impact of incidents on brand and operations 00:16:45 - Key elements every recovery plan must include 00:19:14 - Defining incident severity and matrixes 00:21:52 - Identity as the new perimeter and its operational dependencies 00:24:57 - Why hackers log in rather than break in 00:26:46 - The first hours of a cyber incident response 00:29:35 - Current threat trends and the role of AI 00:31:29 - Updating plans through post-action debriefs 00:34:31 - Cyber insurance gaps and contractual SLAs 00:40:24 - Advice for identity professionals on reducing blast radius 00:46:10 - Personal milestones and looking forward to 2026 Keywords: IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, IAM, Cybersecurity, Business Continuity, Disaster Recovery, Operational Resilience, RSM, Incident Response, Ransomware, Cyber Insurance, Identity Governance

Duration:00:50:07

Ask host to enable sharing for playback control

#396 - Gartner IAM Summit - Majority Rules

1/19/2026
Jeff and Jim are joined by Gartner Analyst Rebecca Archambault for a special live edition of the podcast recorded at the Gartner Identity & Access Management Summit in Grapevine, Texas on December 10, 2025. Instead of a traditional interview, the trio hosts "Majority Rules," an interactive game show where the live audience votes on pressing and fun identity topics. Listen in to hear the pulse of the room on everything from the biggest buzzwords of the year and the true purpose of analyst 1:1 sessions, to the best strategies for navigating the vendor hall. The group explores audience preferences on IGA, AI risks, non-human identities, and the most common lies told in sales cycles. It is a fun, lighthearted look at what identity professionals are actually thinking about the current state of the industry. Connect with Rebecca: https://www.linkedin.com/in/rebecca-becky-archambault-4b4285111/ Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at http://idacpodcast.com Chapter Timestamps 00:00 - Intro and Game Rules 02:40 - First Question: Favorite Podcast 03:15 - Networking vs. Education 04:08 - Buzzword of the Year: Agentic Identity 04:47 - User Behavior Analytics Usage 05:37 - Expo Hall Memories and Socks 06:20 - The Twist: Battle Royale Rules 06:45 - The True Purpose of Analyst 1:1s 07:55 - Mitigating Agentic AI Risks 08:55 - Strategies for the Vendor Hall 09:37 - The Future of IGA 10:15 - Favorite Gartner Reports 11:05 - Benefits of Just-in-Time Access 11:45 - AI in Authentication Priorities 12:35 - Securing Non-Human Identities 13:05 - Keys to Successful B2B IAM 13:40 - The Hardest Part of Role Mining 14:15 - PAM for AI Agents 14:50 - Keynote Takeaways 15:40 - Measuring IAM Success 16:20 - Defining ITDR 17:05 - The Biggest Lie in IAM Sales 17:35 - Least Favorite Gartner Report 18:10 - Audit Preparation Preferences 18:45 - Common Lies in the Vendor Hall 19:15 - The Most Dangerous Access Right 19:35 - Winner Announcement and Outro Keywords IAM, identity management, cybersecurity, Gartner IAM Summit, Majority Rules, game show, Rebecca Archambault, IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, Agentic Identity, ITDR, non-human identity, role mining, zero standing privileges

Duration:00:31:22

Ask host to enable sharing for playback control

#395 - Sponsor Spotlight - Redblock

1/14/2026
#395 - Sponsor Spotlight - Redblock This episode is sponsored by Redblock. Visit redblock.ai/idac to learn more. Jeff and Jim come to you live from the Gartner IAM Summit in Grapevine, Texas, for a special Sponsor Spotlight with Redblock. They sit down with CEO Indus Khaitan to discuss how Redblock uses AI and computer vision to solve the "last mile" problem in identity management: disconnected applications. Indus explains how Redblock acts as an "agentic" layer, using screen recordings to learn administrative tasks for apps that lack APIs. The conversation covers the origin of the company name, the urgency of securing the "long tail" of applications, and how they build trust and guardrails around AI execution. They also discuss the "DoorDash" analogy for identity fulfillment and wrap up with a fun chat about Indus's passion for flying planes. Connect with Indus: https://www.linkedin.com/in/khaitan/ Learn more: redblock.ai/idac Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at [idacpodcast.com](http://idacpodcast.com) Timestamps 00:00 Introduction from Gartner IAM Summit 00:46 Guest Introduction: Indus Khaitan of Redblock 01:40 Indus's Journey into Identity 02:41 The Origin of the Name "Redblock" 04:20 The Underserved Market: Services vs. Software 07:34 The Urgency of Securing Disconnected Apps 09:19 Why Traditional IGA and PAM Aren't Enough 11:35 The DoorDash Analogy: Where Redblock Fits 14:30 What Makes Redblock Unique? (Agentic Process Automation) 16:15 Trusting AI with Security Tasks 18:50 Onboarding Apps via Video Recording 21:23 Deployment: Running Air-Gapped on Customer Cloud 22:17 Handling UI Changes and "Full Self-Driving" Analogy 25:40 Integration with SailPoint and Governance Tools 27:13 Speed of Integration: Days vs. Years 32:00 How the "Headless Browser" Works 33:35 Limitations: Web Apps vs. Thick Clients 36:58 Redblock's 2025 Milestones and Future Outlook 39:48 Call to Action: Solving Disconnected Apps 40:27 Impressions of the Gartner IAM Summit 44:26 Are We in an AI Bubble? 46:46 Indus's Hobby: Flying Planes Keywords IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, Redblock, Indus Khaitan, AI, Artificial Intelligence, IAM, Identity and Access Management, Disconnected Apps, Agentic AI, Computer Vision, Gartner IAM Summit, RPA, IGA, Cybersecurity

Duration:00:55:09

Ask host to enable sharing for playback control

#394 - How Digital ID Can Solve the Fraud Crisis with Sarah Clark

1/12/2026
We are live from the Gartner IAM Summit 2025 in Grapevine, Texas! In this episode, we welcome back Sarah Clark, now the Chief Product Officer and GM of North America at Hopae. Sarah shares her journey from Mastercard to buying rainforests in Costa Rica and rescuing dogs, before diving deep into the world of digital identity infrastructure. We discuss connecting government-issued digital IDs with the private sector to combat fraud and improve user experiences. Sarah breaks down the differences in global adoption, highlighting why the EU is leading the charge with upcoming mandates and how countries like Brazil and India are scaling their programs. We also explore the state of mobile driver's licenses in the US, the potential for age verification and workforce management use cases, and whether the US can catch up to the rest of the world. Plus, we wrap up with a heartfelt conversation about dog rescue and the challenges of pet adoption. Connect with Sarah https://www.linkedin.com/in/sarahmclark/ Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at http://idacpodcast.com Timestamps 00:00:00 - Intro: Live from Gartner IAM Summit 2025 00:01:25 - Introducing Sarah Clark and her journey to Hopae 00:03:00 - What is Hopae and the vision for digital identity infrastructure? 00:04:19 - Why governments are moving toward digital IDs (186 countries!) 00:05:32 - Solving the fraud crisis with government-issued credentials 00:07:05 - The benefits: Security, efficiency, and inclusion 00:08:52 - Global adoption curves: India, Philippines, and Brazil 00:10:48 - The EU vs. US: Who is winning the digital ID race? 00:14:04 - eIDAS 2.0 mandates and the intermediary role 00:17:03 - Future trends: Age verification, Fintech, and stablecoins 00:19:54 - Workforce management and "Know Your Employee" 00:21:28 - Sarah's passion project: Rainforest preservation and dog rescue 00:25:35 - Closing thoughts on the future of identity Keywords IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, Sarah Clark, Hope, Digital Identity, Digital Wallets, Mobile Driver's License, mDL, eIDAS 2.0, Identity Verification, Fraud Prevention, KYC, Verifiable Credentials, Gartner IAM Summit, Digital Infrastructure, Biometrics, Age Verification

Duration:00:46:26

Ask host to enable sharing for playback control

#393 - Breaking the Tyranny of Joiner, Mover, Leaver with Ian Glazer

1/5/2026
Join Jeff, Jim, and special guest Ian Glazer at the Gartner IAM Summit 2025 as they discuss the Identity and Access Management (IAM) industry, the evolution of IAM practices, and the exciting new concepts like Continuous Identity. They delve into topics such as the impact of AI, shared signals framework, and the struggles and triumphs of identity practitioners. Plus, hear about the Digital Identity Advancement Foundation’s mission and enjoy some lighter moments with tales of 'chuckles' and supper clubs. Don't miss this insightful and entertaining episode of the Identity at the Center podcast. Connect with Ian: https://www.linkedin.com/in/iglazer/ Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at http://idacpodcast.com Timestamps 00:00 Introduction and Casual Banter 00:50 Conference Highlights and Podcast Milestones 03:00 Introducing Ian Glazer 05:43 Digital Identity Advancement Foundation (DIF) 08:09 Challenges in Identity Governance and Administration (IGA) 13:28 Continuous Identity: A Paradigm Shift 22:31 Real-World Applications and Organizational Impact 31:51 Realistic Security Measures 32:28 Maturity of Identity and Access Management 34:54 Skills and Challenges in IAM 36:44 Metrics and Outcomes in IAM 40:23 Identity Practitioner Skills 41:19 Solving Problems with AI 46:21 Continuous Identity and Future Trends 48:45 Identity Salon and Community 54:19 Wrapping Up and Future Events Keywords Ian Glazer, Continuous Identity, Shared Signals Framework, CAEP, Gartner IAM Summit, Identity Security, Joiner Mover Leaver, IGA, Access Certification, Identity Salon, IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, IAM, Cybersecurity, Non-Human Identity, Identity Practitioner, DIAF

Duration:00:57:38

Ask host to enable sharing for playback control

#392 - Identiverse DC - Majority Rules

12/17/2025
Join hosts Jeff Steadman and Jim McDonald for a special live episode recorded on location at Identiverse DC! In this interactive session, Jeff and Jim host a game of "Majority Rules," where the audience competes not to answer correctly, but to guess the most popular answer in the room. The game covers a wide range of topics, from the trivial (worst conference swag and the official uniform of an IAM architect) to the technical (securing API keys, the biggest bottlenecks in IGA, and the primary causes of role explosion). Things get intense halfway through with the introduction of the Battle Royale rules, where picking the minority answer sends a player's score back to zero. Watch to see who survives the explosions and takes home the grand prize. Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at http://idacpodcast.com Chapter Timestamps 00:00 Intro to Identity at the Center Live00:36 Explaining the Rules of Majority Rules04:25 Question 1: The Worst Conference Swag06:00 Question 2: Replying to Access Denied07:05 Question 3: AI in Identity Management08:40 Question 4: Favorite MFA Method10:12 Question 5: Least Favorite Auth Factor11:15 Turning up the Heat: Battle Royale Mode12:10 Question 6: Why RBAC is Difficult at Scale13:30 Question 7: The IAM Architect Uniform14:50 Question 8: Best Place to Hide a Secret16:15 Question 9: Protocols You Secretly Miss17:25 Question 10: Most Hated Specialized Key18:40 Question 11: Conference Responsibilities20:00 Question 12: Securing API Keys21:20 Question 13: Secrets to Surviving Keynotes22:55 Question 14: The Biggest Bottleneck in IGA24:45 Question 15: Causes of Role Explosion25:50 Question 16: What Breaks First After a Schema Update26:40 Final Question: Fastest Way to Confuse a User27:40 Crowning the Winner Keywords IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, Identiverse, Identiverse DC, IAM, Identity and Access Management, Cybersecurity, InfoSec Game Show, Live Podcast, Majority Rules, MFA, IGA, API Security, RBAC, Role Explosion, Tech Humor, Cyberrisk Alliance

Duration:00:28:43

Ask host to enable sharing for playback control

#391 - Live from Identiverse DC with John DelMauro

12/15/2025
Jeff and Jim come to you live from the expo floor at Identiverse DC 2025. They are joined by John DelMauro, Executive Vice President at Cyber Risk Alliance, to discuss the energy of regional events and how they differ from the massive Las Vegas gatherings. The group discusses the current state of the identity industry, the inevitable presence of AI in both marketing and event planning, and the "Identity at the Center" game show that took place earlier in the conference. John provides an exclusive look ahead at what is being planned for Identiverse in Las Vegas, including a new algorithmic approach to one-on-one networking, expanded pavilions, and potentially even puppies. Finally, the conversation shifts to a fun hypothetical: if money and logistics were no object, what kind of conference would each of them launch? The answers range from health and longevity in Austin to a technology expo in Japan. Connect with John: https://www.linkedin.com/in/john-del-mauro/ Learn more about the CyberRisk Alliance: https://www.cyberriskalliance.com/ Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at http://idacpodcast.com Chapter Timestamps00:00 Introduction and vibes from Identiverse DC00:52 Recapping the Majority Rules game show02:00 Introducing John DelMauro from Cyber Risk Alliance03:59 What is Cyber Risk Alliance?05:25 The benefits of regional events vs. Las Vegas09:15 Current themes: AI dominating the conversation13:21 How AI helps in planning and researching events15:50 Previewing Identiverse Las Vegas 202517:10 The new one-on-one networking algorithm22:15 Breaking news: Puppies at the conference?24:45 Hypothetical: What dream conference would you host?27:45 Jim's take on a longevity conference29:18 Jeff's dream of a tech nerd-con31:00 Closing thoughts and wrap up KeywordsIDAC, Identity at the Center, Jeff Steadman, Jim McDonald, John DelMauro, CyberRisk Alliance, Identiverse, Cybersecurity, Event Planning, Networking, InfoSec, AI in Events, Washington DC, Conference Trends

Duration:00:32:44

Ask host to enable sharing for playback control

#390 - Identity Management for Agentic AI with Tobin South

12/8/2025
In this episode of the Identity at the Center Podcast, hosts Jeff and Jim sit down with Tobin South, co-chair of the OpenID Foundation's AI Identity Management Community Group, to delve into the intricacies of identity management in the age of agentic AI. They discuss the challenges and solutions related to AI agents, the role of the Model Context Protocol (MCP), and the concept of recursive delegation and scope attenuation. Additionally, the conversation covers practical advice for developers and enterprises on preparing for AI-driven identity management and explores the cultural touchstone of coffee from various global perspectives. Connect with Tobin: https://www.linkedin.com/in/tobinsouth/ OpenID Foundation: https://openid.net/ Identity Management for Agentic AI (OpenID Whitepaper): https://openid.net/wp-content/uploads/2025/10/Identity-Management-for-Agentic-AI.pdf Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at http://idacpodcast.com Chapter Timestamps: 00:00 – Jeff and Jim banter about unopened iPads and conference season 05:55 – Introduction to Tobin South and his AI identity background 07:00 – How AI has evolved from machine learning to generative models 09:00 – The OpenID AI Identity Management Community Group 10:30 – ChatGPT’s impact on the AI perception shift 12:00 – Users vs. Agents: What’s the difference? 14:00 – Letting the right bots in: AI agents vs. bad bots 17:00 – AI impersonation, delegation, and the risk of shared credentials 20:00 – Impersonation vs. Delegation – what practitioners need to know 23:00 – Governance, oversight, and delegated authority for agents 26:00 – Liability and “who is responsible” in agentic systems 30:00 – How developers can prepare for agent identity and access management 32:00 – Explaining the Model Context Protocol (MCP) 36:00 – Enterprise use cases for MCP and internal automation 38:00 – Is MCP the next SAML? 42:00 – Recursive delegation and scope attenuation explained 46:00 – The one key takeaway for IAM professionals 48:00 – Lighter note: Coffee talk – from Sydney to San Francisco 54:00 – Wrap-up and where to find more IDAC content Keywords: IDAC, Identity at the Center, Jim McDonald, Jeff Steadman, Tobin South, OpenID Foundation, AI Identity Management, Agentic AI, Delegated Authority, Impersonation vs Delegation, Model Context Protocol (MCP), Recursive Delegation, Scope Attenuation, Identity Access Management, IAM, AI Governance, AI Standards, Enterprise AI, AI Agents, Identity Security

Duration:00:55:53

Ask host to enable sharing for playback control

#389 - Sponsor Spotlight - Aembit

12/3/2025
This episode is sponsored by Aembit. Visit aembit.io/idac to learn more. Jeff and Jim welcome David Goldschlag, CEO and Co-founder of Aembit, to discuss the rapidly evolving world of non-human access and workload identity. With the rise of AI agents in the enterprise, organizations face a critical challenge: how to secure software-to-software connections without relying on static, shared credentials. David shares his unique background, ranging from working on The Onion Router (Tor) at the Naval Research Lab to the DIVX rental system, and explains how those experiences inform his approach to identity today. The conversation covers the distinction between human and non-human access, the risks of using user credentials for AI agents, and why we must shift from managing secrets to managing access policies. This episode explores real-world use cases for AI agents in financial services and retail, the concept of hybrid versus autonomous agents, and practical advice for identity practitioners looking to get ahead of the agentic AI wave. Visit Aembit: https://aembit.io/idac Connect with David: https://www.linkedin.com/in/davidgoldschlag Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at idacpodcast.com Timestamps 00:00 - Intro00:51 - Pronunciation of Aembit and the extra 'E'01:56 - David's background: From NSA to Enterprise Security04:58 - The meaning behind the name Aembit06:00 - David's history with The Onion Router (Tor)10:00 - Differentiating Non-Human Access from Workforce IAM11:39 - The security risks of AI Agents using human credentials14:15 - Manage Access, Not Secrets16:00 - Use Cases: Financial Analysts and Retail24:00 - Hybrid Agents vs. Autonomous Agents30:38 - Will we have agentic versions of ourselves?36:45 - How Identity Practitioners can handle the AI wave38:33 - Measuring success and ROI for workload identity43:20 - A blast from the past: DIVX and Circuit City52:15 - Closing Keywords IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, Aembit, David Goldschlag, Non-human access, Workload Identity, AI Agents, Machine Identity, Cybersecurity, IAM, InfoSec, Tor, DIVX, Zero Trust, Secrets Management, Authentication, Authorization

Duration:00:53:32

Ask host to enable sharing for playback control

#388 - Fraud Reduction Intelligence Platforms with John Tolbert

12/1/2025
In this episode of The Identity at the Center Podcast, hosts Jim McDonald and Jeff Steadman catch up with John Tolbert, Director of Cybersecurity Research at KuppingerCole Analysts, to talk about the rapidly evolving world of Fraud Reduction Intelligence Platforms (FRIP). They explore: Plus, stick around for a fun discussion about concerts, classic rock, and which legendary bands they wish they’d seen live. Listen now to learn how identity, fraud, and AI are colliding — and what’s next for fraud intelligence. Connect with John: https://www.linkedin.com/in/john-tolbert/ Fraud Reduction Intelligence Platforms - Finance (KuppingerCole Report): https://www.kuppingercole.com/research/lc80841/fraud-reduction-intelligence-platforms-finance Fraud Reduction Intelligence Platforms - eCommerce (KuppingerCole Report): https://www.kuppingercole.com/research/bc81030/fraud-reduction-intelligence-platforms-ecommerce Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at http://idacpodcast.com Chapter Timestamps: 00:00 – Jim’s passwordless rant and setup woes 05:00 – Introducing guest John Tolbert 06:30 – Catching up: four years since John’s last appearance 07:30 – What is CIAM and how has it evolved? 09:30 – Understanding Fraud Reduction Intelligence Platforms (FRIP) 10:00 – The six core capabilities of FRI solutions 13:00 – Are most vendors point solutions or full platforms? 14:00 – How identity verification is improving 16:00 – SaaS and API-driven fraud detection models 18:00 – What kinds of fraud can (and can’t) FRI prevent? 21:00 – The growing problem of bots and automation 22:00 – Fraud trends in finance: scams, account takeovers, and synthetic identities 25:00 – Information sharing and the role of shared signals 28:00 – Collaboration vs. competition in fraud prevention 31:00 – Fraud in e-commerce: bots, loyalty points, and returns abuse 34:00 – Streaming and citizen fraud use cases 36:00 – Where do FRI capabilities fit within IAM platforms? 43:00 – The importance of orchestration and integration 44:30 – The role of AI and ML in fraud prevention 47:30 – Smart questions for evaluating FRI vendors 50:30 – Concert talk: Pink Floyd, Metallica, and the ones that got away 58:00 – Wrap-up and where to find John Tolbert’s reports Keywords: Fraud Reduction Intelligence, FRI Platforms, John Tolbert, KuppingerCole, Identity at the Center, IDAC, IAM, CIAM, Cybersecurity Research, Fraud Prevention, Machine Learning, Artificial Intelligence, Behavioral Biometrics, Device Intelligence, Identity Verification, Risk Orchestration, API Security, Financial Fraud, E-Commerce Fraud, Shared Signals, Jim McDonald, Jeff Steadman, IDAC Podcast

Duration:00:59:29

Ask host to enable sharing for playback control

#387 - InfoSec World 2025 - Trust, Transparency, and Technology: Building Better MSP Partnerships

11/24/2025
Jim McDonald and Jeff Steadman sit down with Mike Reiring of RSM at InfoSec World 2025 to explore how managed service providers are reshaping IT and identity operations. They dig into the differences between MSPs and MSSPs, how to choose the right partner, and how AI is transforming help desks, problem management, and security monitoring. The conversation closes with a fun dive into Mike’s passion for photography and how creativity ties into continuous learning in tech. Connect with Mike: https://www.linkedin.com/in/mreiring/ Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at http://idacpodcast.com Chapters 00:00 Intro – Live from InfoSec World 2025 02:00 Meet Mike Reiring of RSM 04:30 Evolution of Managed Service Providers 06:30 Shared Accounts, Identity, and Security Maturity 09:00 Vendor Gaps and Federated Access Challenges 11:30 What Makes a Good MSP Partner 13:00 The Cost and Effort of Changing Providers 16:30 MSP vs MSSP – Key Differences 18:30 Coordination Between Managed Providers 21:30 Top 3 Questions to Ask Your MSP 25:00 Identity Ownership: IT or Security? 27:30 Licensing, Active Directory, and Hidden Accounts 30:00 RFP Challenges and Procurement Pitfalls 32:00 Measuring Risk and Reducing Identity Exposure 34:30 Vendor Management and Shadow IT Risks 35:00 How AI Is Transforming MSP and MSSP Operations 38:30 AI, Problem Management, and the Future of Help Desks 42:30 Photography, Creativity, and Continuous Learning 48:00 Closing Thoughts and IDAC Outro Keywords IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, Mike Reiring, RSM, InfoSec World 2025, Managed Service Provider, MSP, MSSP, AI in Cybersecurity, Help Desk, Identity Management, Managed Identity, Partner Transparency, IT Outsourcing, Risk Reduction, Problem Management, Active Directory, DaVinci Resolve, Photography in Tech, Identity Governance, Cybersecurity Podcast

Duration:00:50:06