Identity at the Center

#367 - RSM & IDAC Present - The Intersection of Attack Surface Management and Identity

Aug 18, 2025
Dan Lauritzen, Director at RSM Defense with a military human intelligence background turned detection and response lead. He discusses treating identities as assets, how identity abuse fits into the cyber kill chain, and why identity and SOC teams must break down silos. Conversations cover ASM basics, modern detection platforms like XDR/ITDR, data volumes, and practical cross-team collaboration strategies.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
ADVICE

Normalize Identity Signals For Detection

  • Consolidate identity signals into a common schema so detection systems can correlate them with other telemetry.
  • Feed identity events into XDR/SIEM to build timelines and richer detection logic.
ADVICE

Avoid Collecting Unnecessary Data

  • Don't hoard every log; balance collection with storage, processing, and compliance costs.
  • Collect data that's necessary for mission-driven detections and avoid expensive, low-value telemetry.
ADVICE

Share Identity Context With The SOC

  • Share identity personas, credential expectations, and risk scores with the SOC to prioritize alerts.
  • Exchange false-positive patterns so both teams can tune detections and reduce noisy escalations.
Get the Snipd Podcast app to discover more snips from this episode
Get the app