Artwork

المحتوى المقدم من Identity at the Center. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Identity at the Center أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Player FM - تطبيق بودكاست
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !

#309 - IDAC Sponsor Spotlight - Token Security

41:58
 
مشاركة
 

Manage episode 443175042 series 3201233
المحتوى المقدم من Identity at the Center. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Identity at the Center أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.

In this Token Identity sponsored episode of the Identity at the Center podcast, hosts Jeff and Jim welcome Ido Shlomo, co-founder and CTO of Token Security, to discuss the vital and often overlooked topic of non-human identities or machine identities within organizations. The conversation covers how machine identities differ from human identities, the unique challenges they pose, and how Token Security aims to address these issues. Ido shares his personal journey into the cyber-security field, real-life case studies, and details about Token Security's approach to managing and securing machine identities. The episode also delves into the implementation and ROI of their solution and touches on lighter topics like online gaming.

00:00 Welcome to the Identity at the Center Podcast

03:14 Guest Introduction: Ido Shlomo from Token Security

03:35 Ido Shlomo's Journey into Identity Security

06:04 Understanding Token Security's Mission

07:37 Challenges in Machine Identity Management

10:08 Defining Non-Human Identity

11:32 The Story Behind Token Security's Name

13:35 Token Security's Unique Value Proposition

20:20 Real-Life Case Study: The Importance of Non-Human Identity Security

22:05 Narrowing Down the Machines

22:15 Identifying the Compromised Machine

22:26 GitHub Report and API Key

22:34 Event Resolution and Success

22:39 Human vs Non-Human Identity

22:56 Technology Differences and Case Study

23:23 Implementing the Solution

23:46 Philosophy of Software Development

24:28 Integration and Deployment

26:09 Building an Inventory

26:31 Reducing Risk and Lifecycle Process

28:05 Attribution and Data Collection

30:02 Learning More and ROI

34:22 Online Gaming and Personal Insights

34:47 Gaming Personas and Preferences

36:34 Gaming Memories and Character Classes

40:33 Wrapping Up and Final Thoughts

Connect with Ido: https://www.linkedin.com/in/ido--shlomo/

Learn more about Token Security: https://www.token.security/?utm_medium=idac&utm_source=website&utm_campaign=Sep_podcast&utm_content=sponsor_page

Connect with us on LinkedIn:

Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/

Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/

Visit the show on the web at idacpodcast.com and watch at https://www.youtube.com/@idacpodcast

  continue reading

320 حلقات

Artwork
iconمشاركة
 
Manage episode 443175042 series 3201233
المحتوى المقدم من Identity at the Center. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Identity at the Center أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.

In this Token Identity sponsored episode of the Identity at the Center podcast, hosts Jeff and Jim welcome Ido Shlomo, co-founder and CTO of Token Security, to discuss the vital and often overlooked topic of non-human identities or machine identities within organizations. The conversation covers how machine identities differ from human identities, the unique challenges they pose, and how Token Security aims to address these issues. Ido shares his personal journey into the cyber-security field, real-life case studies, and details about Token Security's approach to managing and securing machine identities. The episode also delves into the implementation and ROI of their solution and touches on lighter topics like online gaming.

00:00 Welcome to the Identity at the Center Podcast

03:14 Guest Introduction: Ido Shlomo from Token Security

03:35 Ido Shlomo's Journey into Identity Security

06:04 Understanding Token Security's Mission

07:37 Challenges in Machine Identity Management

10:08 Defining Non-Human Identity

11:32 The Story Behind Token Security's Name

13:35 Token Security's Unique Value Proposition

20:20 Real-Life Case Study: The Importance of Non-Human Identity Security

22:05 Narrowing Down the Machines

22:15 Identifying the Compromised Machine

22:26 GitHub Report and API Key

22:34 Event Resolution and Success

22:39 Human vs Non-Human Identity

22:56 Technology Differences and Case Study

23:23 Implementing the Solution

23:46 Philosophy of Software Development

24:28 Integration and Deployment

26:09 Building an Inventory

26:31 Reducing Risk and Lifecycle Process

28:05 Attribution and Data Collection

30:02 Learning More and ROI

34:22 Online Gaming and Personal Insights

34:47 Gaming Personas and Preferences

36:34 Gaming Memories and Character Classes

40:33 Wrapping Up and Final Thoughts

Connect with Ido: https://www.linkedin.com/in/ido--shlomo/

Learn more about Token Security: https://www.token.security/?utm_medium=idac&utm_source=website&utm_campaign=Sep_podcast&utm_content=sponsor_page

Connect with us on LinkedIn:

Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/

Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/

Visit the show on the web at idacpodcast.com and watch at https://www.youtube.com/@idacpodcast

  continue reading

320 حلقات

كل الحلقات

×
 
Loading …

مرحبًا بك في مشغل أف ام!

يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.

 

دليل مرجعي سريع