Artwork

Innhold levert av Identity at the Center. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av Identity at the Center eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.
Player FM - Podcast-app
Gå frakoblet med Player FM -appen!

#309 - IDAC Sponsor Spotlight - Token Security

41:58
 
Del
 

Manage episode 443175042 series 3201233
Innhold levert av Identity at the Center. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av Identity at the Center eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.

In this Token Identity sponsored episode of the Identity at the Center podcast, hosts Jeff and Jim welcome Ido Shlomo, co-founder and CTO of Token Security, to discuss the vital and often overlooked topic of non-human identities or machine identities within organizations. The conversation covers how machine identities differ from human identities, the unique challenges they pose, and how Token Security aims to address these issues. Ido shares his personal journey into the cyber-security field, real-life case studies, and details about Token Security's approach to managing and securing machine identities. The episode also delves into the implementation and ROI of their solution and touches on lighter topics like online gaming.

00:00 Welcome to the Identity at the Center Podcast

03:14 Guest Introduction: Ido Shlomo from Token Security

03:35 Ido Shlomo's Journey into Identity Security

06:04 Understanding Token Security's Mission

07:37 Challenges in Machine Identity Management

10:08 Defining Non-Human Identity

11:32 The Story Behind Token Security's Name

13:35 Token Security's Unique Value Proposition

20:20 Real-Life Case Study: The Importance of Non-Human Identity Security

22:05 Narrowing Down the Machines

22:15 Identifying the Compromised Machine

22:26 GitHub Report and API Key

22:34 Event Resolution and Success

22:39 Human vs Non-Human Identity

22:56 Technology Differences and Case Study

23:23 Implementing the Solution

23:46 Philosophy of Software Development

24:28 Integration and Deployment

26:09 Building an Inventory

26:31 Reducing Risk and Lifecycle Process

28:05 Attribution and Data Collection

30:02 Learning More and ROI

34:22 Online Gaming and Personal Insights

34:47 Gaming Personas and Preferences

36:34 Gaming Memories and Character Classes

40:33 Wrapping Up and Final Thoughts

Connect with Ido: https://www.linkedin.com/in/ido--shlomo/

Learn more about Token Security: https://www.token.security/?utm_medium=idac&utm_source=website&utm_campaign=Sep_podcast&utm_content=sponsor_page

Connect with us on LinkedIn:

Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/

Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/

Visit the show on the web at idacpodcast.com and watch at https://www.youtube.com/@idacpodcast

  continue reading

320 episoder

Artwork
iconDel
 
Manage episode 443175042 series 3201233
Innhold levert av Identity at the Center. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av Identity at the Center eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.

In this Token Identity sponsored episode of the Identity at the Center podcast, hosts Jeff and Jim welcome Ido Shlomo, co-founder and CTO of Token Security, to discuss the vital and often overlooked topic of non-human identities or machine identities within organizations. The conversation covers how machine identities differ from human identities, the unique challenges they pose, and how Token Security aims to address these issues. Ido shares his personal journey into the cyber-security field, real-life case studies, and details about Token Security's approach to managing and securing machine identities. The episode also delves into the implementation and ROI of their solution and touches on lighter topics like online gaming.

00:00 Welcome to the Identity at the Center Podcast

03:14 Guest Introduction: Ido Shlomo from Token Security

03:35 Ido Shlomo's Journey into Identity Security

06:04 Understanding Token Security's Mission

07:37 Challenges in Machine Identity Management

10:08 Defining Non-Human Identity

11:32 The Story Behind Token Security's Name

13:35 Token Security's Unique Value Proposition

20:20 Real-Life Case Study: The Importance of Non-Human Identity Security

22:05 Narrowing Down the Machines

22:15 Identifying the Compromised Machine

22:26 GitHub Report and API Key

22:34 Event Resolution and Success

22:39 Human vs Non-Human Identity

22:56 Technology Differences and Case Study

23:23 Implementing the Solution

23:46 Philosophy of Software Development

24:28 Integration and Deployment

26:09 Building an Inventory

26:31 Reducing Risk and Lifecycle Process

28:05 Attribution and Data Collection

30:02 Learning More and ROI

34:22 Online Gaming and Personal Insights

34:47 Gaming Personas and Preferences

36:34 Gaming Memories and Character Classes

40:33 Wrapping Up and Final Thoughts

Connect with Ido: https://www.linkedin.com/in/ido--shlomo/

Learn more about Token Security: https://www.token.security/?utm_medium=idac&utm_source=website&utm_campaign=Sep_podcast&utm_content=sponsor_page

Connect with us on LinkedIn:

Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/

Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/

Visit the show on the web at idacpodcast.com and watch at https://www.youtube.com/@idacpodcast

  continue reading

320 episoder

Semua episode

×
 
Loading …

Velkommen til Player FM!

Player FM scanner netter for høykvalitets podcaster som du kan nyte nå. Det er den beste podcastappen og fungerer på Android, iPhone og internett. Registrer deg for å synkronisere abonnement på flere enheter.

 

Hurtigreferanseguide

Copyright 2024 | Sitemap | Personvern | Vilkår for bruk | | opphavsrett