

Identity at the Center
Identity at the Center
Identity at the Center is a weekly podcast all about identity security in the context of identity and access management (IAM). With decades of real-world IAM experience, hosts Jim McDonald and Jeff Steadman bring you conversations with news, topics, and guests from the identity management industry. Do you know who has access to what?
Episodes
Mentioned books

Mar 15, 2021 • 45min
#84 - Solorigate Recap with Robb Reck
Jim and Jeff talk with Robb Reck, Chief Information Security Officer at Ping Identity, about the Solar Winds breach aka Solorigate, Zero Trust, and Identity Management Day 2021.Connect with Robb on LinkedIn here: https://www.linkedin.com/in/robbreck/Robb's Colorado = Security Podcast: https://www.colorado-security.com/Identity Management Day 2021: www.identitymanagementday.orgIdentiverse 2021: https://identiverse.com/Connect with Jim and Jeff on LinkedIn here:Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/Visit the show at www.IdentityAtTheCenter.comand follow @IDACPodcast on Twitter.

Mar 8, 2021 • 50min
#83 - Penetration Testing with Krissy Safi
Jim and Jeff talk with Krissy Safi, Managing Director and Global Practice Leader for Attack & Penetration Testing at Protiviti, about penetration testing - what it is and why IAM is important to it.Connect with Krissy here: https://www.linkedin.com/in/krissysafi/Resources to learn more about hacking Pen Testing: https://HackerHighSchool.org https://OWASP.org https://www.reddit.com/r/HowToHack/Identity Management Day 2021: www.identitymanagementday.orgIdentiverse 2021: https://identiverse.com/Connect with Jim and Jeff on LinkedIn here:Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/Visit the show at www.IdentityAtTheCenter.comand follow @IDACPodcast on Twitter.

Mar 1, 2021 • 40min
#82 - Organizational Change Management with Carlos Rodriguez
Jim and Jeff talk with Carlos Rodriguez, Director IT Security & Risk at Citizens Property Insurance, about organizational change management, bringing stakeholders to the table, and Agile versus Waterfall project methodologies.Connect with Carlos on LinkedIn here: https://www.linkedin.com/in/carlosrodrigueza/Managing Organizational change in IAM and IS Programs: https://multifactor-authentication.enterprisesecuritymag.com/cxoinsight/how-to-build-a-successful-identity-and-access-management-iam-program-nid-2225-cid-52.htmlSecure Application Development: When Life is a Sprint and not a Marathon: https://www.linkedin.com/pulse/secure-application-development-when-life-sprint-rodriguez-cissp-cismConnect with Jim and Jeff on LinkedIn here:Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/Visit the show at www.IdentityAtTheCenter.com and follow @IDACPodcast on Twitter.

Feb 22, 2021 • 49min
#81 - RBAC with Jim and Jeff
Jim and Jeff talk about what Role Based Access Control is and ideas on how to tackle these complicated projects at an organization.Connect with Jim and Jeff on LinkedIn here:Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/Visit the show at www.IdentityAtTheCenter.comand follow @IDACPodcast on Twitter.

Feb 15, 2021 • 44min
#80 - People-Centric IAM and Breach Prevention with FRYdentity
Jim and Jeff talk with Alec Fry, aka FRYdentity, about designing people-centric IAM processes and services and how it impacts an organization's ability to prevent breaches.Connect with Alec on LinkedIn: https://www.linkedin.com/in/frydentity/IDSA Report "Identity and Access Management: The Stakeholder Perspective": https://www.idsalliance.org/blog/2021/02/04/new-research-provides-iam-stakeholder-perspective-on-access-challenges/Connect with Jim and Jeff on LinkedIn here:Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/Visit the show at www.IdentityAtTheCenter.comand follow @IDACPodcast on Twitter.

Feb 8, 2021 • 36min
#79 - Zero Trust with Dr. Chase Cunningham
Jim and Jeff talk with Dr. Chase Cunningham, Chief Strategy Officer (CSO) at Ericom Software, about Zero Trust in the real world.Connect with Chase on LinkedIn: https://www.linkedin.com/in/dr-chase-cunningham-54b26243/Read Chase's book: https://www.amazon.com/dp/B084ZN2HBD/ref=dp-kindle-redirect?_encoding=UTF8&btkr=1Learn more about Ericom Software: https://www.ericom.com/Google BeyondCorp: https://cloud.google.com/beyondcorpGoogle BeyondCorp explainer video: Getting started with BeyondCorp: A deeper look into IAPMicrosoft ZeroTrust: https://www.microsoft.com/en-us/security/business/zero-trustGeorge Finney "Well Aware" (Book): https://www.amazon.com/dp/B08JHPNJ58/ref=dp-kindle-redirect?_encoding=UTF8&btkr=1Connect with Jim and Jeff on LinkedIn here:Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/Visit the show at www.IdentityAtTheCenter.comand follow @IDACPodcast on Twitter.

Feb 1, 2021 • 44min
#78 - Digital Transformation and IAM with Luis Almeida
Jim and Jeff talk with Luis Almeida, Chief Revenue Officer at Clear Skye, about the role IAM is playing in digital transformation.Connect with Luis on LinkedIn: https://www.linkedin.com/in/lalmeida/Learn more about Clear Skye: https://clearskye.com/Connect with Jim and Jeff on LinkedIn here:Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/Visit the show at www.IdentityAtTheCenter.comand follow @IDACPodcast on Twitter.

Jan 25, 2021 • 46min
#77 - Women in Identity with Kay Chopard
Jim and Jeff talk with Kay Chopard, US Ambassador for the Women in Identity organization, about their goals, their membership (that includes not just women), and the role that mentors and mentees play in their career.Connect with Kay Chopard on LinkdedIn: https://www.linkedin.com/in/kaychopard/Women in Identity on the web: https://womeninidentity.org/Book - The Silent Sex: https://press.princeton.edu/books/paperback/9780691159768/the-silent-sexBook - Athena Rising: http://www.davidgsmithphd.com/thebookBook - Weapons of Math Destruction: https://en.wikipedia.org/wiki/Weapons_of_Math_DestructionKay's Reading List (Google Doc): https://drive.google.com/file/d/14DcbjekxJCgBrDiXlKMz0L_r2M-J30yq/view?ts=60099e13Webinar - Big 10 Law School Series on Race & Law: https://law.indiana.edu/news-events/lectures-events/race-law.htmlConnect with Jim and Jeff on LinkedIn here:Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/Visit the show at www.IdentityAtTheCenter.comand follow @IDACPodcast on Twitter.

Jan 18, 2021 • 1h 14min
#76 - IAM as a Career with IDPro Ian Glazer
Welcome to 2021 and back to the office! Jim and Jeff talk with Ian Glazer, Co-Founder and Vice President of IDPro, about his career in the IAM space and how IDPro is positioning itself to help the IAM community.Connect with Ian on LinkedIn: https://www.linkedin.com/in/iglazer/IDPro: https://www.IDPro.orgIdentity: The Next Ten Years: https://identiverse.gallery.video/detail/video/6184188772001/identity:-the-next-ten-years&q=ianThe Skills and Experiences of Identity Practitioners: https://identiverse.gallery.video/detail/video/6185202225001/the-skills-and-experiences-of-identity-practitioners&q=ianIan's blog post: https://www.tuesdaynight.org/2018/12/27/finding-your-secret-strengths/Connect with Jim and Jeff on LinkedIn here:Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/Visit the show at www.IdentityAtTheCenter.comand follow @IDACPodcast on Twitter.

Dec 28, 2020 • 26min
#75 - SolarWinds Breach with Paul Volosen
In this engaging discussion, Paul Volosen, an Information Security Architect and VP at Mitsubishi UFJ Financial Group, dives into the alarming SolarWinds breach. He explains the Trojanized updates and their stealthy execution, highlighting the implications for Active Directory and identity access management. Paul reveals how attackers leveraged theft of private keys to impersonate users and outlines the broad international impact. He stresses the importance of monitoring vendor privileges and shares how MFA played a crucial role in the breach's discovery.


