<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd">
    <channel>
        <itunes:owner>
            <itunes:name>Elimity</itunes:name>
            <itunes:email>chiel@elimity.com</itunes:email>
        </itunes:owner>
        <title>Elimity</title>
        <link>https://videos.elimity.com</link>
        <description></description>
        <language>en-us</language>
        <generator>Visualplatform</generator>
        <docs>http://blogs.law.harvard.edu/tech/rss</docs>
        <itunes:author>Elimity</itunes:author>
        <itunes:type>episodic</itunes:type>
        <itunes:explicit>no</itunes:explicit>
        <itunes:image href="https://videos.elimity.com/files/rv0.0/sitelogo.gif"/>
        <image>
            <url>https://videos.elimity.com/files/rv0.0/sitelogo.gif</url>
            <title>Elimity</title>
            <link>https://videos.elimity.com</link>
        </image>
        <atom:link rel="self" href="https://videos.elimity.com/audiopodcast/tag/data-driven iam"/>
        <atom:link rel="next" href="https://videos.elimity.com/audiopodcast/tag/data-driven iam?tag=data%2ddriven+iam&amp;p=2&amp;podcast%5fp=t&amp;https="/>
        <item>
            <enclosure url="http://videos.elimity.com/64968568/102142574/07e9f6f9460c51f7cf52de274ac71900/audio/podcast/102142574-14-audio.mp3" type="audio/mp3" length="1293516"/>
            <title>[IData-Driven IAM ] The 3 Main Challenges</title>
            <link>http://videos.elimity.com/idata-driven-iam-the-3-main</link>
            <description>&lt;p&gt;Identity and access management (IAM) presents a complex challenge in the digital era.&lt;/p&gt;
&lt;p&gt;Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.&lt;/p&gt;
&lt;p&gt;At Elimity and Indigo Consulting, we see a number of recurring challenges:&lt;/p&gt;
&lt;p&gt;1️⃣ Identity sprawl: there is an exponential growth of identities and access rights in many organization due to cloud, IT and other technologies.&lt;/p&gt;
&lt;p&gt;2️⃣ Siloed information: these identities are spread across many individual environments,&lt;br /&gt;
resulting into escalating costs.&lt;/p&gt;
&lt;p&gt;3️⃣ Resource scarcity: all while IAM resources and expertise are becoming more scarce.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/idata-driven-iam-the-3-main"&gt;&lt;img src="http://videos.elimity.com/64968568/102142574/07e9f6f9460c51f7cf52de274ac71900/standard/download-14-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/102142574</guid>
            <pubDate>Mon, 17 Jun 2024 09:23:54 GMT</pubDate>
            <media:title>[IData-Driven IAM ] The 3 Main Challenges</media:title>
            <itunes:summary>Identity and access management (IAM) presents a complex challenge in the digital era.
Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.
At Elimity and Indigo Consulting, we see a number of recurring challenges:
1️⃣ Identity sprawl: there is an exponential growth of identities and access rights in many organization due to cloud, IT and other technologies.
2️⃣ Siloed information: these identities are spread across many individual environments,
resulting into escalating costs.
3️⃣ Resource scarcity: all while IAM resources and expertise are becoming more scarce.</itunes:summary>
            <itunes:subtitle>Identity and access management (IAM) presents a complex challenge in the digital era.
Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2,...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:48</itunes:duration>
            <media:description type="html">&lt;p&gt;Identity and access management (IAM) presents a complex challenge in the digital era.&lt;/p&gt;
&lt;p&gt;Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.&lt;/p&gt;
&lt;p&gt;At Elimity and Indigo Consulting, we see a number of recurring challenges:&lt;/p&gt;
&lt;p&gt;1️⃣ Identity sprawl: there is an exponential growth of identities and access rights in many organization due to cloud, IT and other technologies.&lt;/p&gt;
&lt;p&gt;2️⃣ Siloed information: these identities are spread across many individual environments,&lt;br /&gt;
resulting into escalating costs.&lt;/p&gt;
&lt;p&gt;3️⃣ Resource scarcity: all while IAM resources and expertise are becoming more scarce.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/idata-driven-iam-the-3-main"&gt;&lt;img src="http://videos.elimity.com/64968568/102142574/07e9f6f9460c51f7cf52de274ac71900/standard/download-14-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=07e9f6f9460c51f7cf52de274ac71900&amp;source=podcast&amp;photo%5fid=102142574" width="625" height="352" type="text/html" medium="video" duration="108" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968568/102142574/07e9f6f9460c51f7cf52de274ac71900/standard/download-14-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968568/102142574/07e9f6f9460c51f7cf52de274ac71900/standard/download-14-thumbnail.jpg/thumbnail.jpg"/>
            <category>Data-Driven IAM</category>
            <category>IAM</category>
            <category>Identity Analytics</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968568/102142572/1f52db3930a592edce2689be8c554683/audio/podcast/102142572-14-audio.mp3" type="audio/mp3" length="1006065"/>
            <title>[IData-Driven IAM ] Identity Analytics on Top of your IGA</title>
            <link>http://videos.elimity.com/idata-driven-iam-identity</link>
            <description>&lt;p&gt;At Indigo Consulting and Elimity, we see identity data challenges at companies with very large IAM teams and mature IGA deployments.&lt;/p&gt;
&lt;p&gt;In that case, even though they already have an IGA solution that manages the user lifecycle - JML -  for many applications, the teams still lack the identity visibility.&lt;/p&gt;
&lt;p&gt;And when we say teams, for these large organizations it means Auditors, Security teams, Business IT, Application owners, and so on. As a result of that, lots of time is still wasted on generating and waiting for IAM reports - and lot’s of critical data gaps are never accounted for.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/idata-driven-iam-identity"&gt;&lt;img src="http://videos.elimity.com/64968568/102142572/1f52db3930a592edce2689be8c554683/standard/download-14-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/102142572</guid>
            <pubDate>Mon, 17 Jun 2024 09:23:54 GMT</pubDate>
            <media:title>[IData-Driven IAM ] Identity Analytics on Top of your IGA</media:title>
            <itunes:summary>At Indigo Consulting and Elimity, we see identity data challenges at companies with very large IAM teams and mature IGA deployments.
In that case, even though they already have an IGA solution that manages the user lifecycle - JML -  for many applications, the teams still lack the identity visibility.
And when we say teams, for these large organizations it means Auditors, Security teams, Business IT, Application owners, and so on. As a result of that, lots of time is still wasted on generating and waiting for IAM reports - and lot’s of critical data gaps are never accounted for.</itunes:summary>
            <itunes:subtitle>At Indigo Consulting and Elimity, we see identity data challenges at companies with very large IAM teams and mature IGA deployments.
In that case, even though they already have an IGA solution that manages the user lifecycle - JML -  for many...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:24</itunes:duration>
            <media:description type="html">&lt;p&gt;At Indigo Consulting and Elimity, we see identity data challenges at companies with very large IAM teams and mature IGA deployments.&lt;/p&gt;
&lt;p&gt;In that case, even though they already have an IGA solution that manages the user lifecycle - JML -  for many applications, the teams still lack the identity visibility.&lt;/p&gt;
&lt;p&gt;And when we say teams, for these large organizations it means Auditors, Security teams, Business IT, Application owners, and so on. As a result of that, lots of time is still wasted on generating and waiting for IAM reports - and lot’s of critical data gaps are never accounted for.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/idata-driven-iam-identity"&gt;&lt;img src="http://videos.elimity.com/64968568/102142572/1f52db3930a592edce2689be8c554683/standard/download-14-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=1f52db3930a592edce2689be8c554683&amp;source=podcast&amp;photo%5fid=102142572" width="625" height="352" type="text/html" medium="video" duration="84" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968568/102142572/1f52db3930a592edce2689be8c554683/standard/download-14-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968568/102142572/1f52db3930a592edce2689be8c554683/standard/download-14-thumbnail.jpg/thumbnail.jpg"/>
            <category> CMMC etc.   However</category>
            <category>Data-Driven IAM</category>
            <category> especially with regulations such as NIS2</category>
            <category>IAM</category>
            <category>Identity Analytics</category>
            <category>IGA</category>
            <category> in practice we see a number of recurring challenges: identity sprawl: there is an exponential growth of identities and access rights in many organization due to cloud</category>
            <category> ISO27001</category>
            <category> IT and other technologies</category>
            <category> resulting into escalating costs  Resource scarcity: all while IAM resources and expertise are becoming more scarce.</category>
            <category> siloed information: these identities are spread across many individual environments</category>
            <category> SOC2</category>
            <category>The reason that we chose this topic is that securing access to data and applications has become a cornerstone of any modern cybersecurity strategy</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968568/102142570/7a2664fd113d59b21679b2dfd3d687b9/audio/podcast/102142570-13-audio.mp3" type="audio/mp3" length="609840"/>
            <title>[Data-Driven IAM] Merger and Acquisition</title>
            <link>http://videos.elimity.com/data-driven-iam-merger-and</link>
            <description>&lt;p&gt;Identity and access management (IAM) presents a complex challenge in the digital era.&lt;/p&gt;
&lt;p&gt;Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.&lt;/p&gt;
&lt;p&gt;At Indigo Consulting and Elimity, we see that merging companies struggle to have a streamlined identity and access management process.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/data-driven-iam-merger-and"&gt;&lt;img src="http://videos.elimity.com/64968568/102142570/7a2664fd113d59b21679b2dfd3d687b9/standard/download-13-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/102142570</guid>
            <pubDate>Mon, 17 Jun 2024 09:23:54 GMT</pubDate>
            <media:title>[Data-Driven IAM] Merger and Acquisition</media:title>
            <itunes:summary>Identity and access management (IAM) presents a complex challenge in the digital era.
Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.
At Indigo Consulting and Elimity, we see that merging companies struggle to have a streamlined identity and access management process.</itunes:summary>
            <itunes:subtitle>Identity and access management (IAM) presents a complex challenge in the digital era.
Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2,...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>00:51</itunes:duration>
            <media:description type="html">&lt;p&gt;Identity and access management (IAM) presents a complex challenge in the digital era.&lt;/p&gt;
&lt;p&gt;Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.&lt;/p&gt;
&lt;p&gt;At Indigo Consulting and Elimity, we see that merging companies struggle to have a streamlined identity and access management process.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/data-driven-iam-merger-and"&gt;&lt;img src="http://videos.elimity.com/64968568/102142570/7a2664fd113d59b21679b2dfd3d687b9/standard/download-13-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=7a2664fd113d59b21679b2dfd3d687b9&amp;source=podcast&amp;photo%5fid=102142570" width="625" height="352" type="text/html" medium="video" duration="51" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968568/102142570/7a2664fd113d59b21679b2dfd3d687b9/standard/download-13-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968568/102142570/7a2664fd113d59b21679b2dfd3d687b9/standard/download-13-thumbnail.jpg/thumbnail.jpg"/>
            <category>Data-Driven IAM</category>
            <category>IAM</category>
            <category>Identity Analytics</category>
            <category>IGA</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968568/102142567/d92c0f224b4afb06bffe976a9067f55d/audio/podcast/102142567-12-audio.mp3" type="audio/mp3" length="1827355"/>
            <title>[Data-Driven IAM] Start Your IGA Journey</title>
            <link>http://videos.elimity.com/data-driven-iam-start-your-iga</link>
            <description>&lt;p&gt;Identity and access management (IAM) presents a complex challenge in the digital era.&lt;/p&gt;
&lt;p&gt;Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.&lt;/p&gt;
&lt;p&gt;For companies at the start of their IGA journey, this data-driven, risk-driven approach has the potential to let them achieve mature access governance in a matter of days, not months.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/data-driven-iam-start-your-iga"&gt;&lt;img src="http://videos.elimity.com/64968568/102142567/d92c0f224b4afb06bffe976a9067f55d/standard/download-12-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/102142567</guid>
            <pubDate>Mon, 17 Jun 2024 09:23:54 GMT</pubDate>
            <media:title>[Data-Driven IAM] Start Your IGA Journey</media:title>
            <itunes:summary>Identity and access management (IAM) presents a complex challenge in the digital era.
Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.
For companies at the start of their IGA journey, this data-driven, risk-driven approach has the potential to let them achieve mature access governance in a matter of days, not months.</itunes:summary>
            <itunes:subtitle>Identity and access management (IAM) presents a complex challenge in the digital era.
Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2,...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>02:32</itunes:duration>
            <media:description type="html">&lt;p&gt;Identity and access management (IAM) presents a complex challenge in the digital era.&lt;/p&gt;
&lt;p&gt;Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.&lt;/p&gt;
&lt;p&gt;For companies at the start of their IGA journey, this data-driven, risk-driven approach has the potential to let them achieve mature access governance in a matter of days, not months.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/data-driven-iam-start-your-iga"&gt;&lt;img src="http://videos.elimity.com/64968568/102142567/d92c0f224b4afb06bffe976a9067f55d/standard/download-12-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=d92c0f224b4afb06bffe976a9067f55d&amp;source=podcast&amp;photo%5fid=102142567" width="625" height="352" type="text/html" medium="video" duration="152" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968568/102142567/d92c0f224b4afb06bffe976a9067f55d/standard/download-12-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968568/102142567/d92c0f224b4afb06bffe976a9067f55d/standard/download-12-thumbnail.jpg/thumbnail.jpg"/>
            <category>Data-Driven IAM</category>
            <category>IAM</category>
            <category>Identity Analytics</category>
            <category>Lightweight Identity Governance</category>
        </item>
    </channel>
</rss>
