<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd">
    <channel>
        <itunes:owner>
            <itunes:name>Elimity</itunes:name>
            <itunes:email>chiel@elimity.com</itunes:email>
        </itunes:owner>
        <title>Elimity</title>
        <link>https://videos.elimity.com</link>
        <description></description>
        <language>en-us</language>
        <generator>Visualplatform</generator>
        <docs>http://blogs.law.harvard.edu/tech/rss</docs>
        <itunes:author>Elimity</itunes:author>
        <itunes:type>episodic</itunes:type>
        <itunes:explicit>no</itunes:explicit>
        <itunes:image href="https://videos.elimity.com/files/rv0.0/sitelogo.gif"/>
        <image>
            <url>https://videos.elimity.com/files/rv0.0/sitelogo.gif</url>
            <title>Elimity</title>
            <link>https://videos.elimity.com</link>
        </image>
        <atom:link rel="self" href="https://videos.elimity.com/podcast"/>
        <atom:link rel="next" href="https://videos.elimity.com/podcast?p=2&amp;frontpage%5fp=t&amp;podcast%5fp=t&amp;https="/>
        <item>
            <enclosure url="http://videos.elimity.com/64968571/124091198/847851448075d8ec8c8e2e258ec35aa3/video_medium/the-rise-of-ivip-game-changer-or-1-video.mp4?source=podcast" type="video/mp4" length="228093489"/>
            <title>The Rise of IVIP - Game Changer or Hype?</title>
            <link>http://videos.elimity.com/the-rise-of-ivip-game-changer-or-1</link>
            <description>&lt;p&gt;&lt;h1&gt;&lt;strong&gt;The Rise of Identity Visibility and Intelligence Platforms (IVIP)&lt;/strong&gt;&lt;/h1&gt;&lt;h2&gt;&lt;strong&gt;Game Changer or Hype?&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Identity programs are under pressure.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;Cloud, SaaS sprawl, non-human identities, and AI-driven access have pushed traditional IAM and IGA beyond their limits. Even the most mature environments struggle with one critical challenge: &lt;strong&gt;visibility&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In this exclusive webinar, two industry leaders &lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/maartendecat/"&gt;&lt;strong&gt;&lt;u&gt;Dr. Maarten Decat&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt; (CEO and Co-Founder Elimity)&lt;/strong&gt; and &lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/heiko-klarl/"&gt;&lt;strong&gt;&lt;u&gt;Dr. Heiko Klarl&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt; (CEO Nexis)&lt;/strong&gt; come together for an open, unscripted conversation on Gartner’s newest category:&amp;nbsp;&lt;strong&gt;Identity Visibility &amp;amp; Intelligence Platforms (IVIP).&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;True shift in identity governance or just the next buzzword?&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;What to expect&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This session is hosted in a &lt;strong&gt;podcast-style format&lt;/strong&gt;, with minimal slides and maximum conversation. You can join live or simply listen on the road.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;You’ll gain clarity on:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;↳ What IVIP actually means&lt;/p&gt;
&lt;p&gt;↳ The real-world problems and opportunities customers face today&lt;/p&gt;
&lt;p&gt;↳ Why IGA alone is no longer enough to achieve full identity control&lt;/p&gt;
&lt;p&gt;↳ How IVIP complements IAM and IGA in practice&lt;/p&gt;
&lt;p&gt;↳ The future of identity governance&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The discussion will be moderated by &lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/timo-copp/"&gt;&lt;strong&gt;&lt;u&gt;Timo Copp&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt; (Managing Director&amp;nbsp;&lt;strong&gt;SonicBee&lt;/strong&gt;) and includes an &lt;strong&gt;open floor for live Q&amp;amp;A&lt;/strong&gt;.&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/the-rise-of-ivip-game-changer-or-1"&gt;&lt;img src="http://videos.elimity.com/64968571/124091198/847851448075d8ec8c8e2e258ec35aa3/standard/download-14-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/124091198</guid>
            <pubDate>Thu, 26 Feb 2026 17:13:28 GMT</pubDate>
            <media:title>The Rise of IVIP - Game Changer or Hype?</media:title>
            <itunes:summary>The Rise of Identity Visibility and Intelligence Platforms (IVIP)Game Changer or Hype?Identity programs are under pressure.
Cloud, SaaS sprawl, non-human identities, and AI-driven access have pushed traditional IAM and IGA beyond their limits. Even the most mature environments struggle with one critical challenge: visibility.

In this exclusive webinar, two industry leaders Dr. Maarten Decat (CEO and Co-Founder Elimity) and Dr. Heiko Klarl (CEO Nexis) come together for an open, unscripted conversation on Gartner’s newest category:Identity Visibility  Intelligence Platforms (IVIP).

True shift in identity governance or just the next buzzword?
What to expectThis session is hosted in a podcast-style format, with minimal slides and maximum conversation. You can join live or simply listen on the road.

You’ll gain clarity on:

↳ What IVIP actually means
↳ The real-world problems and opportunities customers face today
↳ Why IGA alone is no longer enough to achieve full identity control
↳ How IVIP complements IAM and IGA in practice
↳ The future of identity governance

The discussion will be moderated by Timo Copp (Managing DirectorSonicBee) and includes an open floor for live QA.
</itunes:summary>
            <itunes:subtitle>The Rise of Identity Visibility and Intelligence Platforms (IVIP)Game Changer or Hype?Identity programs are under pressure.
Cloud, SaaS sprawl, non-human identities, and AI-driven access have pushed traditional IAM and IGA beyond their limits....</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:00:35</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;h1&gt;&lt;strong&gt;The Rise of Identity Visibility and Intelligence Platforms (IVIP)&lt;/strong&gt;&lt;/h1&gt;&lt;h2&gt;&lt;strong&gt;Game Changer or Hype?&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Identity programs are under pressure.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;Cloud, SaaS sprawl, non-human identities, and AI-driven access have pushed traditional IAM and IGA beyond their limits. Even the most mature environments struggle with one critical challenge: &lt;strong&gt;visibility&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In this exclusive webinar, two industry leaders &lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/maartendecat/"&gt;&lt;strong&gt;&lt;u&gt;Dr. Maarten Decat&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt; (CEO and Co-Founder Elimity)&lt;/strong&gt; and &lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/heiko-klarl/"&gt;&lt;strong&gt;&lt;u&gt;Dr. Heiko Klarl&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt; (CEO Nexis)&lt;/strong&gt; come together for an open, unscripted conversation on Gartner’s newest category:&amp;nbsp;&lt;strong&gt;Identity Visibility &amp;amp; Intelligence Platforms (IVIP).&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;True shift in identity governance or just the next buzzword?&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;What to expect&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This session is hosted in a &lt;strong&gt;podcast-style format&lt;/strong&gt;, with minimal slides and maximum conversation. You can join live or simply listen on the road.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;You’ll gain clarity on:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;↳ What IVIP actually means&lt;/p&gt;
&lt;p&gt;↳ The real-world problems and opportunities customers face today&lt;/p&gt;
&lt;p&gt;↳ Why IGA alone is no longer enough to achieve full identity control&lt;/p&gt;
&lt;p&gt;↳ How IVIP complements IAM and IGA in practice&lt;/p&gt;
&lt;p&gt;↳ The future of identity governance&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The discussion will be moderated by &lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/timo-copp/"&gt;&lt;strong&gt;&lt;u&gt;Timo Copp&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt; (Managing Director&amp;nbsp;&lt;strong&gt;SonicBee&lt;/strong&gt;) and includes an &lt;strong&gt;open floor for live Q&amp;amp;A&lt;/strong&gt;.&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/the-rise-of-ivip-game-changer-or-1"&gt;&lt;img src="http://videos.elimity.com/64968571/124091198/847851448075d8ec8c8e2e258ec35aa3/standard/download-14-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=847851448075d8ec8c8e2e258ec35aa3&amp;source=podcast&amp;photo%5fid=124091198" width="625" height="352" type="text/html" medium="video" duration="3635" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968571/124091198/847851448075d8ec8c8e2e258ec35aa3/standard/download-14-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968571/124091198/847851448075d8ec8c8e2e258ec35aa3/standard/download-14-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968561/105894810/ebe14abb973956b2704543203ac941d8/video_medium/nis2-und-iam-wie-sie-in-kurzester-1-video.mp4?source=podcast" type="video/mp4" length="123732484"/>
            <title>NIS2 und IAM: Wie Sie in kürzester Zeit volle Kontrolle über Zugriffsrechte...</title>
            <link>http://videos.elimity.com/nis2-und-iam-wie-sie-in-kurzester-1</link>
            <description>&lt;p&gt;&lt;p&gt;Die NIS2-Richtlinie verlangt von Ihnen, alle Aspekte Ihrer Cybersicherheit unter Kontrolle zu haben.&amp;nbsp;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Da über 90 % der Angriffe auf den Missbrauch von Benutzerzugriffen zurückzuführen sind, ist die Kontrolle von Benutzerzugriffen entscheidend, um die NIS2-Konformität zu erreichen.&lt;br&gt;&lt;/p&gt;&lt;p&gt;Am &lt;strong&gt;Mittwoch, den 30. Oktober, um 16:00 Uhr (CET)&lt;/strong&gt; werden die Experten von &lt;strong&gt;Secusys&lt;/strong&gt;, Teil der OEDIV Gruppe, zusammen mit &lt;strong&gt;Elimity&lt;/strong&gt; eine Session veranstalten, um folgende Themen zu behandeln:&lt;br&gt;&lt;/p&gt;&lt;p&gt;✅ NIS2: Wichtige Änderungen und Auswirkungen&lt;/p&gt;&lt;p&gt;✅ NIS2 &amp;amp; IAM: Anforderungen, Governance und Berichterstattung&lt;/p&gt;&lt;p&gt;✅ Praxisbeispiel: NIS2-Konformität mit begrenzten Ressourcen erreichen&lt;/p&gt;&lt;p&gt;✅ Lösung: Leichtgewichtige Identity Governance&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/nis2-und-iam-wie-sie-in-kurzester-1"&gt;&lt;img src="http://videos.elimity.com/64968561/105894810/ebe14abb973956b2704543203ac941d8/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/105894810</guid>
            <pubDate>Wed, 11 Feb 2026 09:37:59 GMT</pubDate>
            <media:title>NIS2 und IAM: Wie Sie in kürzester Zeit volle Kontrolle über Zugriffsrechte...</media:title>
            <itunes:summary>Die NIS2-Richtlinie verlangt von Ihnen, alle Aspekte Ihrer Cybersicherheit unter Kontrolle zu haben.Da über 90 % der Angriffe auf den Missbrauch von Benutzerzugriffen zurückzuführen sind, ist die Kontrolle von Benutzerzugriffen entscheidend, um die NIS2-Konformität zu erreichen.Am Mittwoch, den 30. Oktober, um 16:00 Uhr (CET) werden die Experten von Secusys, Teil der OEDIV Gruppe, zusammen mit Elimity eine Session veranstalten, um folgende Themen zu behandeln:✅ NIS2: Wichtige Änderungen und Auswirkungen✅ NIS2  IAM: Anforderungen, Governance und Berichterstattung✅ Praxisbeispiel: NIS2-Konformität mit begrenzten Ressourcen erreichen✅ Lösung: Leichtgewichtige Identity Governance</itunes:summary>
            <itunes:subtitle>Die NIS2-Richtlinie verlangt von Ihnen, alle Aspekte Ihrer Cybersicherheit unter Kontrolle zu haben.Da über 90 % der Angriffe auf den Missbrauch von Benutzerzugriffen zurückzuführen sind, ist die Kontrolle von Benutzerzugriffen entscheidend, um...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>45:08</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;p&gt;Die NIS2-Richtlinie verlangt von Ihnen, alle Aspekte Ihrer Cybersicherheit unter Kontrolle zu haben.&amp;nbsp;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Da über 90 % der Angriffe auf den Missbrauch von Benutzerzugriffen zurückzuführen sind, ist die Kontrolle von Benutzerzugriffen entscheidend, um die NIS2-Konformität zu erreichen.&lt;br&gt;&lt;/p&gt;&lt;p&gt;Am &lt;strong&gt;Mittwoch, den 30. Oktober, um 16:00 Uhr (CET)&lt;/strong&gt; werden die Experten von &lt;strong&gt;Secusys&lt;/strong&gt;, Teil der OEDIV Gruppe, zusammen mit &lt;strong&gt;Elimity&lt;/strong&gt; eine Session veranstalten, um folgende Themen zu behandeln:&lt;br&gt;&lt;/p&gt;&lt;p&gt;✅ NIS2: Wichtige Änderungen und Auswirkungen&lt;/p&gt;&lt;p&gt;✅ NIS2 &amp;amp; IAM: Anforderungen, Governance und Berichterstattung&lt;/p&gt;&lt;p&gt;✅ Praxisbeispiel: NIS2-Konformität mit begrenzten Ressourcen erreichen&lt;/p&gt;&lt;p&gt;✅ Lösung: Leichtgewichtige Identity Governance&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/nis2-und-iam-wie-sie-in-kurzester-1"&gt;&lt;img src="http://videos.elimity.com/64968561/105894810/ebe14abb973956b2704543203ac941d8/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=ebe14abb973956b2704543203ac941d8&amp;source=podcast&amp;photo%5fid=105894810" width="625" height="352" type="text/html" medium="video" duration="2708" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968561/105894810/ebe14abb973956b2704543203ac941d8/standard/download-9-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968561/105894810/ebe14abb973956b2704543203ac941d8/standard/download-9-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968568/123404654/43be1a0716aebf73558415b4f6e65003/video_medium/case-study-geoxyz-1-video.mp4?source=podcast" type="video/mp4" length="11037342"/>
            <title>Case Study - GEOxyz</title>
            <link>http://videos.elimity.com/case-study-geoxyz-1</link>
            <description>&lt;p&gt;&lt;h1&gt;&lt;strong&gt;How GEOxyz Took Control Over User Access to Support ISO 27001 Compliance&lt;/strong&gt;&lt;/h1&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;GEOxyz operates in a highly data-driven and security-sensitive environment. With a growing digital footprint and increasing regulatory pressure from &lt;strong&gt;ISO 27001&lt;/strong&gt; and &lt;strong&gt;NIS2&lt;/strong&gt;, the organisation needed a clear, defensible understanding of &lt;strong&gt;who has access to what&lt;/strong&gt;, &lt;strong&gt;and why&lt;/strong&gt;, across its critical systems.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&#128073; Download the full customer story:&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://elimity.com/case-studies/geoxyz"&gt;https://elimity.com/case-studies/geoxyz&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/case-study-geoxyz-1"&gt;&lt;img src="http://videos.elimity.com/64968568/123404654/43be1a0716aebf73558415b4f6e65003/standard/download-16-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/123404654</guid>
            <pubDate>Mon, 09 Feb 2026 15:15:34 GMT</pubDate>
            <media:title>Case Study - GEOxyz</media:title>
            <itunes:summary>How GEOxyz Took Control Over User Access to Support ISO 27001 ComplianceGEOxyz operates in a highly data-driven and security-sensitive environment. With a growing digital footprint and increasing regulatory pressure from ISO 27001 and NIS2, the organisation needed a clear, defensible understanding of who has access to what, and why, across its critical systems.&#128073; Download the full customer story:https://elimity.com/case-studies/geoxyz</itunes:summary>
            <itunes:subtitle>How GEOxyz Took Control Over User Access to Support ISO 27001 ComplianceGEOxyz operates in a highly data-driven and security-sensitive environment. With a growing digital footprint and increasing regulatory pressure from ISO 27001 and NIS2, the...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:59</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;h1&gt;&lt;strong&gt;How GEOxyz Took Control Over User Access to Support ISO 27001 Compliance&lt;/strong&gt;&lt;/h1&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;GEOxyz operates in a highly data-driven and security-sensitive environment. With a growing digital footprint and increasing regulatory pressure from &lt;strong&gt;ISO 27001&lt;/strong&gt; and &lt;strong&gt;NIS2&lt;/strong&gt;, the organisation needed a clear, defensible understanding of &lt;strong&gt;who has access to what&lt;/strong&gt;, &lt;strong&gt;and why&lt;/strong&gt;, across its critical systems.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&#128073; Download the full customer story:&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://elimity.com/case-studies/geoxyz"&gt;https://elimity.com/case-studies/geoxyz&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/case-study-geoxyz-1"&gt;&lt;img src="http://videos.elimity.com/64968568/123404654/43be1a0716aebf73558415b4f6e65003/standard/download-16-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=43be1a0716aebf73558415b4f6e65003&amp;source=podcast&amp;photo%5fid=123404654" width="625" height="352" type="text/html" medium="video" duration="119" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968568/123404654/43be1a0716aebf73558415b4f6e65003/standard/download-16-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968568/123404654/43be1a0716aebf73558415b4f6e65003/standard/download-16-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968569/101971575/8a93d34c57aa8c076aa75e7f3047bcae/video_medium/iam-and-nis-2-5-tips-to-take-video.mp4?source=podcast" type="video/mp4" length="56270749"/>
            <title>IAM and NIS 2: 5 Tips to Take Control of User Access Within Days </title>
            <link>http://videos.elimity.com/iam-and-nis-2-5-tips-to-take</link>
            <description>&lt;p&gt;NIS2 requires you to be in control of all aspects of your cybersecurity. 

With over 90% of attacks exploiting user access, controlling user access has become key to achieving NIS2-compliance.

✅ NIS2 and IAM: The Ins and Outs
✅ 5 Tips how to Control User Access within Days
✅ Customer Cases at industry leaders such as NMBS, Attentia and Federale&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/iam-and-nis-2-5-tips-to-take"&gt;&lt;img src="http://videos.elimity.com/64968569/101971575/8a93d34c57aa8c076aa75e7f3047bcae/standard/download-11-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/101971575</guid>
            <pubDate>Mon, 02 Feb 2026 11:51:12 GMT</pubDate>
            <media:title>IAM and NIS 2: 5 Tips to Take Control of User Access Within Days </media:title>
            <itunes:summary>NIS2 requires you to be in control of all aspects of your cybersecurity. 

With over 90% of attacks exploiting user access, controlling user access has become key to achieving NIS2-compliance.

✅ NIS2 and IAM: The Ins and Outs
✅ 5 Tips how to Control User Access within Days
✅ Customer Cases at industry leaders such as NMBS, Attentia and Federale</itunes:summary>
            <itunes:subtitle>NIS2 requires you to be in control of all aspects of your cybersecurity. 

With over 90% of attacks exploiting user access, controlling user access has become key to achieving NIS2-compliance.

✅ NIS2 and IAM: The Ins and Outs
✅ 5 Tips how to...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>22:21</itunes:duration>
            <media:description type="html">&lt;p&gt;NIS2 requires you to be in control of all aspects of your cybersecurity. 

With over 90% of attacks exploiting user access, controlling user access has become key to achieving NIS2-compliance.

✅ NIS2 and IAM: The Ins and Outs
✅ 5 Tips how to Control User Access within Days
✅ Customer Cases at industry leaders such as NMBS, Attentia and Federale&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/iam-and-nis-2-5-tips-to-take"&gt;&lt;img src="http://videos.elimity.com/64968569/101971575/8a93d34c57aa8c076aa75e7f3047bcae/standard/download-11-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=8a93d34c57aa8c076aa75e7f3047bcae&amp;source=podcast&amp;photo%5fid=101971575" width="625" height="352" type="text/html" medium="video" duration="1341" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968569/101971575/8a93d34c57aa8c076aa75e7f3047bcae/standard/download-11-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968569/101971575/8a93d34c57aa8c076aa75e7f3047bcae/standard/download-11-thumbnail.jpg/thumbnail.jpg"/>
            <category>IAM</category>
            <category>Identity Governance</category>
            <category>Keynote</category>
            <category>NIS2</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968578/118201694/298aed2802ce32f6c57361940000862e/video_medium/6-iam-steps-you-have-to-do-before-1-video.mp4?source=podcast" type="video/mp4" length="157102919"/>
            <title>6 IAM Steps You Have To Do Before Implementing CoPilot</title>
            <link>http://videos.elimity.com/6-iam-steps-you-have-to-do-before-1</link>
            <description>&lt;p&gt;&lt;h1&gt;&lt;strong&gt;Secure Your Copilot Rollout: 6 IAM Steps You Can’t Skip&lt;/strong&gt;&lt;/h1&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;“Hi Copilot, can you share the payslips of the CEO at my company?”&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Are you rolling out Microsoft 365 Copilot? You’ll need more than just licenses.&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Identity risks like &lt;strong&gt;overexposed permissions&lt;/strong&gt;, &lt;strong&gt;orphaned accounts&lt;/strong&gt;, and &lt;strong&gt;weak access governance&lt;/strong&gt; can delay or even derail your deployment.&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;In this session, Elimity and &lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/mikedenbuurman/"&gt;&lt;strong&gt;&lt;u&gt;CISO Mike Den Buurman&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt; show you how to prepare your organization for Copilot — with a lightweight, fast-track approach to IAM.&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;What you’ll learn:&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;✅ Why &lt;strong&gt;40%&lt;/strong&gt; of Copilot rollouts are &lt;strong&gt;delayed&lt;/strong&gt; (and how to avoid it)&lt;br&gt;✅ &lt;strong&gt;6 essential IAM steps&lt;/strong&gt; to secure your Copilot deployment&lt;br&gt;✅ How to get actionable &lt;strong&gt;access insights&lt;/strong&gt; in just 1 day&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Perfect for CISOs, IT security leads, and identity owners who want to launch Copilot with confidence.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/6-iam-steps-you-have-to-do-before-1"&gt;&lt;img src="http://videos.elimity.com/64968578/118201694/298aed2802ce32f6c57361940000862e/standard/download-11-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/118201694</guid>
            <pubDate>Thu, 06 Nov 2025 10:31:22 GMT</pubDate>
            <media:title>6 IAM Steps You Have To Do Before Implementing CoPilot</media:title>
            <itunes:summary>Secure Your Copilot Rollout: 6 IAM Steps You Can’t Skip“Hi Copilot, can you share the payslips of the CEO at my company?”Are you rolling out Microsoft 365 Copilot? You’ll need more than just licenses.Identity risks like overexposed permissions, orphaned accounts, and weak access governance can delay or even derail your deployment.In this session, Elimity and CISO Mike Den Buurman show you how to prepare your organization for Copilot — with a lightweight, fast-track approach to IAM.What you’ll learn:✅ Why 40% of Copilot rollouts are delayed (and how to avoid it)✅ 6 essential IAM steps to secure your Copilot deployment✅ How to get actionable access insights in just 1 dayPerfect for CISOs, IT security leads, and identity owners who want to launch Copilot with confidence.</itunes:summary>
            <itunes:subtitle>Secure Your Copilot Rollout: 6 IAM Steps You Can’t Skip“Hi Copilot, can you share the payslips of the CEO at my company?”Are you rolling out Microsoft 365 Copilot? You’ll need more than just licenses.Identity risks like overexposed permissions,...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>51:42</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;h1&gt;&lt;strong&gt;Secure Your Copilot Rollout: 6 IAM Steps You Can’t Skip&lt;/strong&gt;&lt;/h1&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;“Hi Copilot, can you share the payslips of the CEO at my company?”&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Are you rolling out Microsoft 365 Copilot? You’ll need more than just licenses.&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Identity risks like &lt;strong&gt;overexposed permissions&lt;/strong&gt;, &lt;strong&gt;orphaned accounts&lt;/strong&gt;, and &lt;strong&gt;weak access governance&lt;/strong&gt; can delay or even derail your deployment.&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;In this session, Elimity and &lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/mikedenbuurman/"&gt;&lt;strong&gt;&lt;u&gt;CISO Mike Den Buurman&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt; show you how to prepare your organization for Copilot — with a lightweight, fast-track approach to IAM.&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;What you’ll learn:&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;✅ Why &lt;strong&gt;40%&lt;/strong&gt; of Copilot rollouts are &lt;strong&gt;delayed&lt;/strong&gt; (and how to avoid it)&lt;br&gt;✅ &lt;strong&gt;6 essential IAM steps&lt;/strong&gt; to secure your Copilot deployment&lt;br&gt;✅ How to get actionable &lt;strong&gt;access insights&lt;/strong&gt; in just 1 day&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Perfect for CISOs, IT security leads, and identity owners who want to launch Copilot with confidence.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/6-iam-steps-you-have-to-do-before-1"&gt;&lt;img src="http://videos.elimity.com/64968578/118201694/298aed2802ce32f6c57361940000862e/standard/download-11-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=298aed2802ce32f6c57361940000862e&amp;source=podcast&amp;photo%5fid=118201694" width="625" height="352" type="text/html" medium="video" duration="3102" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968578/118201694/298aed2802ce32f6c57361940000862e/standard/download-11-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968578/118201694/298aed2802ce32f6c57361940000862e/standard/download-11-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968570/118399848/ef0316894e39ff4103d22ba037822a06/video_medium/elimity-customer-case-m365-video.mp4?source=podcast" type="video/mp4" length="2685374"/>
            <title>Elimity - Customer Case M365 Copilot by CISO MIke</title>
            <link>http://videos.elimity.com/elimity-customer-case-m365</link>
            <description>&lt;p&gt;&lt;h1&gt;&lt;strong&gt;Secure Your Copilot Rollout: 6 IAM Steps You Can’t Skip&lt;/strong&gt;&lt;/h1&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;“Hi Copilot, can you share the payslips of the CEO at my company?”&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Are you rolling out Microsoft 365 Copilot? You’ll need more than just licenses.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Identity risks like &lt;strong&gt;overexposed permissions&lt;/strong&gt;, &lt;strong&gt;orphaned accounts&lt;/strong&gt;, and &lt;strong&gt;weak access governance&lt;/strong&gt; can delay or even derail your deployment.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In this session, Elimity and &lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/mikedenbuurman/"&gt;&lt;strong&gt;&lt;u&gt;CISO Mike Den Buurman&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt; show you how to prepare your organization for Copilot — with a lightweight, fast-track approach to IAM.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;What you’ll learn:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ Why &lt;strong&gt;40%&lt;/strong&gt; of Copilot rollouts are &lt;strong&gt;delayed&lt;/strong&gt; (and how to avoid it)&lt;br&gt;✅ &lt;strong&gt;6 essential IAM steps&lt;/strong&gt; to secure your Copilot deployment&lt;br&gt;✅ How to get actionable &lt;strong&gt;access insights&lt;/strong&gt; in just 1 day&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Perfect for CISOs, IT security leads, and identity owners who want to launch Copilot with confidence.&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/elimity-customer-case-m365"&gt;&lt;img src="http://videos.elimity.com/64968570/118399848/ef0316894e39ff4103d22ba037822a06/standard/download-11-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/118399848</guid>
            <pubDate>Thu, 06 Nov 2025 10:31:22 GMT</pubDate>
            <media:title>Elimity - Customer Case M365 Copilot by CISO MIke</media:title>
            <itunes:summary>Secure Your Copilot Rollout: 6 IAM Steps You Can’t Skip
“Hi Copilot, can you share the payslips of the CEO at my company?”

Are you rolling out Microsoft 365 Copilot? You’ll need more than just licenses.

Identity risks like overexposed permissions, orphaned accounts, and weak access governance can delay or even derail your deployment.

In this session, Elimity and CISO Mike Den Buurman show you how to prepare your organization for Copilot — with a lightweight, fast-track approach to IAM.

What you’ll learn:

✅ Why 40% of Copilot rollouts are delayed (and how to avoid it)✅ 6 essential IAM steps to secure your Copilot deployment✅ How to get actionable access insights in just 1 day

Perfect for CISOs, IT security leads, and identity owners who want to launch Copilot with confidence.
</itunes:summary>
            <itunes:subtitle>Secure Your Copilot Rollout: 6 IAM Steps You Can’t Skip
“Hi Copilot, can you share the payslips of the CEO at my company?”

Are you rolling out Microsoft 365 Copilot? You’ll need more than just licenses.

Identity risks like overexposed...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>00:52</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;h1&gt;&lt;strong&gt;Secure Your Copilot Rollout: 6 IAM Steps You Can’t Skip&lt;/strong&gt;&lt;/h1&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;“Hi Copilot, can you share the payslips of the CEO at my company?”&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Are you rolling out Microsoft 365 Copilot? You’ll need more than just licenses.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Identity risks like &lt;strong&gt;overexposed permissions&lt;/strong&gt;, &lt;strong&gt;orphaned accounts&lt;/strong&gt;, and &lt;strong&gt;weak access governance&lt;/strong&gt; can delay or even derail your deployment.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In this session, Elimity and &lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/mikedenbuurman/"&gt;&lt;strong&gt;&lt;u&gt;CISO Mike Den Buurman&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt; show you how to prepare your organization for Copilot — with a lightweight, fast-track approach to IAM.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;What you’ll learn:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ Why &lt;strong&gt;40%&lt;/strong&gt; of Copilot rollouts are &lt;strong&gt;delayed&lt;/strong&gt; (and how to avoid it)&lt;br&gt;✅ &lt;strong&gt;6 essential IAM steps&lt;/strong&gt; to secure your Copilot deployment&lt;br&gt;✅ How to get actionable &lt;strong&gt;access insights&lt;/strong&gt; in just 1 day&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Perfect for CISOs, IT security leads, and identity owners who want to launch Copilot with confidence.&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/elimity-customer-case-m365"&gt;&lt;img src="http://videos.elimity.com/64968570/118399848/ef0316894e39ff4103d22ba037822a06/standard/download-11-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=ef0316894e39ff4103d22ba037822a06&amp;source=podcast&amp;photo%5fid=118399848" width="625" height="352" type="text/html" medium="video" duration="52" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968570/118399848/ef0316894e39ff4103d22ba037822a06/standard/download-11-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968570/118399848/ef0316894e39ff4103d22ba037822a06/standard/download-11-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968575/116786930/a01e351582d54e52415994c68e4ddad9/video_medium/the-fast-track-to-iam-maturity-1-video.mp4?source=podcast" type="video/mp4" length="81156994"/>
            <title>The Fast Track to IAM Maturity -  How CISOs Can Prove Control &amp; Compliance</title>
            <link>http://videos.elimity.com/the-fast-track-to-iam-maturity-1</link>
            <description>&lt;p&gt;&lt;h1&gt;&lt;strong&gt;The Fast Track to IAM Maturity&lt;/strong&gt;&lt;/h1&gt;&lt;h2&gt;&lt;strong&gt;How CISOs Can Prove Control &amp;amp; Compliance&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;New regulations like &lt;strong&gt;NIS2&lt;/strong&gt;, &lt;strong&gt;DORA&lt;/strong&gt; and &lt;strong&gt;ISO 27001&lt;/strong&gt; require CISOs to demonstrate control over user access, clearly and quickly.&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;In this session, Elimity shows you how to fast-track IAM maturity with a lightweight, audit-ready approach to identity governance.&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;What you’ll learn:&lt;/p&gt;&lt;p&gt;&lt;br&gt;✅ Key IAM requirements under NIS2, DORA &amp;amp; ISO 27001&lt;br&gt;✅ How to gain access visibility in days, not months&lt;br&gt;✅ How to prove compliance without complex projects&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Perfect for CISOs, auditors, and security leaders working in regulated environments.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/the-fast-track-to-iam-maturity-1"&gt;&lt;img src="http://videos.elimity.com/64968575/116786930/a01e351582d54e52415994c68e4ddad9/standard/download-11-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/116786930</guid>
            <pubDate>Mon, 29 Sep 2025 14:07:31 GMT</pubDate>
            <media:title>The Fast Track to IAM Maturity -  How CISOs Can Prove Control &amp; Compliance</media:title>
            <itunes:summary>The Fast Track to IAM MaturityHow CISOs Can Prove Control  ComplianceNew regulations like NIS2, DORA and ISO 27001 require CISOs to demonstrate control over user access, clearly and quickly.In this session, Elimity shows you how to fast-track IAM maturity with a lightweight, audit-ready approach to identity governance.What you’ll learn:✅ Key IAM requirements under NIS2, DORA  ISO 27001✅ How to gain access visibility in days, not months✅ How to prove compliance without complex projectsPerfect for CISOs, auditors, and security leaders working in regulated environments.</itunes:summary>
            <itunes:subtitle>The Fast Track to IAM MaturityHow CISOs Can Prove Control  ComplianceNew regulations like NIS2, DORA and ISO 27001 require CISOs to demonstrate control over user access, clearly and quickly.In this session, Elimity shows you how to fast-track IAM...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>29:51</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;h1&gt;&lt;strong&gt;The Fast Track to IAM Maturity&lt;/strong&gt;&lt;/h1&gt;&lt;h2&gt;&lt;strong&gt;How CISOs Can Prove Control &amp;amp; Compliance&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;New regulations like &lt;strong&gt;NIS2&lt;/strong&gt;, &lt;strong&gt;DORA&lt;/strong&gt; and &lt;strong&gt;ISO 27001&lt;/strong&gt; require CISOs to demonstrate control over user access, clearly and quickly.&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;In this session, Elimity shows you how to fast-track IAM maturity with a lightweight, audit-ready approach to identity governance.&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;What you’ll learn:&lt;/p&gt;&lt;p&gt;&lt;br&gt;✅ Key IAM requirements under NIS2, DORA &amp;amp; ISO 27001&lt;br&gt;✅ How to gain access visibility in days, not months&lt;br&gt;✅ How to prove compliance without complex projects&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Perfect for CISOs, auditors, and security leaders working in regulated environments.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/the-fast-track-to-iam-maturity-1"&gt;&lt;img src="http://videos.elimity.com/64968575/116786930/a01e351582d54e52415994c68e4ddad9/standard/download-11-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=a01e351582d54e52415994c68e4ddad9&amp;source=podcast&amp;photo%5fid=116786930" width="625" height="352" type="text/html" medium="video" duration="1791" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968575/116786930/a01e351582d54e52415994c68e4ddad9/standard/download-11-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968575/116786930/a01e351582d54e52415994c68e4ddad9/standard/download-11-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968579/113954829/aba9d5d593fba650184384146be03209/video_medium/light-iam-governance-fastest-1-video.mp4?source=podcast" type="video/mp4" length="127350548"/>
            <title>Light IAM &amp; Governance - Fastest Track to NIS2 Compliance</title>
            <link>http://videos.elimity.com/light-iam-governance-fastest-1</link>
            <description>&lt;p&gt;&lt;h1&gt;&lt;strong&gt;Light IAM &amp;amp; Governance - Fastest Track to NIS2-Compliance&lt;/strong&gt;&lt;/h1&gt;&lt;h2&gt;How Identum and Elimity help you automate and control user access within days.&lt;/h2&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Join us for the live webinar where experts from Identum and Elimity will walk you show you how you achieve NIS2-compliance within days.&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Learn how to automate identity provisioning, gain full visibility into access rights, enforce least privilege, and simplify audits.&amp;nbsp;&lt;/p&gt;&lt;p&gt;We’ll cover:&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;✅&amp;nbsp; The NIS2 challenges European organisations are facing&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;✅&amp;nbsp; Automating secure onboarding/offboarding with Identum&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;✅&amp;nbsp; Gaining visibility and governance with Elimity&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;✅&amp;nbsp; Real-world examples of simplified compliance&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/light-iam-governance-fastest-1"&gt;&lt;img src="http://videos.elimity.com/64968579/113954829/aba9d5d593fba650184384146be03209/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/113954829</guid>
            <pubDate>Wed, 25 Jun 2025 14:02:55 GMT</pubDate>
            <media:title>Light IAM &amp; Governance - Fastest Track to NIS2 Compliance</media:title>
            <itunes:summary>Light IAM  Governance - Fastest Track to NIS2-ComplianceHow Identum and Elimity help you automate and control user access within days.Join us for the live webinar where experts from Identum and Elimity will walk you show you how you achieve NIS2-compliance within days.Learn how to automate identity provisioning, gain full visibility into access rights, enforce least privilege, and simplify audits.We’ll cover:✅ The NIS2 challenges European organisations are facing✅ Automating secure onboarding/offboarding with Identum✅ Gaining visibility and governance with Elimity✅ Real-world examples of simplified compliance</itunes:summary>
            <itunes:subtitle>Light IAM  Governance - Fastest Track to NIS2-ComplianceHow Identum and Elimity help you automate and control user access within days.Join us for the live webinar where experts from Identum and Elimity will walk you show you how you achieve...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>45:45</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;h1&gt;&lt;strong&gt;Light IAM &amp;amp; Governance - Fastest Track to NIS2-Compliance&lt;/strong&gt;&lt;/h1&gt;&lt;h2&gt;How Identum and Elimity help you automate and control user access within days.&lt;/h2&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Join us for the live webinar where experts from Identum and Elimity will walk you show you how you achieve NIS2-compliance within days.&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Learn how to automate identity provisioning, gain full visibility into access rights, enforce least privilege, and simplify audits.&amp;nbsp;&lt;/p&gt;&lt;p&gt;We’ll cover:&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;✅&amp;nbsp; The NIS2 challenges European organisations are facing&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;✅&amp;nbsp; Automating secure onboarding/offboarding with Identum&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;✅&amp;nbsp; Gaining visibility and governance with Elimity&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;✅&amp;nbsp; Real-world examples of simplified compliance&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/light-iam-governance-fastest-1"&gt;&lt;img src="http://videos.elimity.com/64968579/113954829/aba9d5d593fba650184384146be03209/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=aba9d5d593fba650184384146be03209&amp;source=podcast&amp;photo%5fid=113954829" width="625" height="352" type="text/html" medium="video" duration="2745" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968579/113954829/aba9d5d593fba650184384146be03209/standard/download-9-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968579/113954829/aba9d5d593fba650184384146be03209/standard/download-9-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968560/113691040/c367d1ec374c4b138b05690bb0a0ec12/video_medium/whos-elimity-interview-by-joobs-video.mp4?source=podcast" type="video/mp4" length="9115432"/>
            <title>Who's Elimity? Interview by Joobs</title>
            <link>http://videos.elimity.com/whos-elimity-interview-by-joobs</link>
            <description>&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/whos-elimity-interview-by-joobs"&gt;&lt;img src="http://videos.elimity.com/64968560/113691040/c367d1ec374c4b138b05690bb0a0ec12/standard/download-17-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/113691040</guid>
            <pubDate>Fri, 13 Jun 2025 09:33:33 GMT</pubDate>
            <media:title>Who's Elimity? Interview by Joobs</media:title>
            <itunes:summary></itunes:summary>
            <itunes:subtitle></itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:56</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/whos-elimity-interview-by-joobs"&gt;&lt;img src="http://videos.elimity.com/64968560/113691040/c367d1ec374c4b138b05690bb0a0ec12/standard/download-17-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=c367d1ec374c4b138b05690bb0a0ec12&amp;source=podcast&amp;photo%5fid=113691040" width="625" height="1111" type="text/html" medium="video" duration="116" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968560/113691040/c367d1ec374c4b138b05690bb0a0ec12/standard/download-17-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968560/113691040/c367d1ec374c4b138b05690bb0a0ec12/standard/download-17-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968567/112989989/754f9d82895bb3e3c6b065f71beb9222/video_medium/identity-data-from-chaos-to-5-video.mp4?source=podcast" type="video/mp4" length="130583617"/>
            <title>Identity Data: From Chaos to Visibility</title>
            <link>http://videos.elimity.com/identity-data-from-chaos-to-5</link>
            <description>&lt;p&gt;&lt;p&gt;Many organizations rely on siloed IAM tools, leading to duplicated processes and &lt;strong&gt;limited data visibility.&lt;/strong&gt; But IAM isn’t just about automation, it’s about gaining insights from identity data to stay secure and compliant.&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;An &lt;strong&gt;identity data fabric&lt;/strong&gt; connects data across all IAM sources, delivering the visibility and control today’s environments demand.&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;That’s why we’re hosting a focused webinar on how &lt;strong&gt;data-driven Identity and Access Management &lt;/strong&gt;(IAM) can help you move from identity chaos to clarity:&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;✅ Why IAM projects often fail in modern, distributed environments&lt;/p&gt;&lt;p&gt;✅&amp;nbsp; 5 practical tips to gain identity visibility in days—not months&lt;/p&gt;&lt;p&gt;✅&amp;nbsp; Real-world insights from a Fortune 500 company&lt;/p&gt;&lt;p&gt;✅&amp;nbsp; Live demo: how identity data analytics empowers agile IAM&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;u&gt;When?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&#128197; &lt;strong&gt;Date&lt;/strong&gt;: May 20th, 2025&lt;br&gt;&#128338; &lt;strong&gt;Time&lt;/strong&gt;: 9:00 AM CET&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/identity-data-from-chaos-to-5"&gt;&lt;img src="http://videos.elimity.com/64968567/112989989/754f9d82895bb3e3c6b065f71beb9222/standard/download-11-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/112989989</guid>
            <pubDate>Mon, 26 May 2025 15:22:14 GMT</pubDate>
            <media:title>Identity Data: From Chaos to Visibility</media:title>
            <itunes:summary>Many organizations rely on siloed IAM tools, leading to duplicated processes and limited data visibility. But IAM isn’t just about automation, it’s about gaining insights from identity data to stay secure and compliant.An identity data fabric connects data across all IAM sources, delivering the visibility and control today’s environments demand.That’s why we’re hosting a focused webinar on how data-driven Identity and Access Management (IAM) can help you move from identity chaos to clarity:✅ Why IAM projects often fail in modern, distributed environments✅ 5 practical tips to gain identity visibility in days—not months✅ Real-world insights from a Fortune 500 company✅ Live demo: how identity data analytics empowers agile IAMWhen?&#128197; Date: May 20th, 2025&#128338; Time: 9:00 AM CET</itunes:summary>
            <itunes:subtitle>Many organizations rely on siloed IAM tools, leading to duplicated processes and limited data visibility. But IAM isn’t just about automation, it’s about gaining insights from identity data to stay secure and compliant.An identity data fabric...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>40:05</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;p&gt;Many organizations rely on siloed IAM tools, leading to duplicated processes and &lt;strong&gt;limited data visibility.&lt;/strong&gt; But IAM isn’t just about automation, it’s about gaining insights from identity data to stay secure and compliant.&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;An &lt;strong&gt;identity data fabric&lt;/strong&gt; connects data across all IAM sources, delivering the visibility and control today’s environments demand.&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;That’s why we’re hosting a focused webinar on how &lt;strong&gt;data-driven Identity and Access Management &lt;/strong&gt;(IAM) can help you move from identity chaos to clarity:&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;✅ Why IAM projects often fail in modern, distributed environments&lt;/p&gt;&lt;p&gt;✅&amp;nbsp; 5 practical tips to gain identity visibility in days—not months&lt;/p&gt;&lt;p&gt;✅&amp;nbsp; Real-world insights from a Fortune 500 company&lt;/p&gt;&lt;p&gt;✅&amp;nbsp; Live demo: how identity data analytics empowers agile IAM&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;u&gt;When?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&#128197; &lt;strong&gt;Date&lt;/strong&gt;: May 20th, 2025&lt;br&gt;&#128338; &lt;strong&gt;Time&lt;/strong&gt;: 9:00 AM CET&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/identity-data-from-chaos-to-5"&gt;&lt;img src="http://videos.elimity.com/64968567/112989989/754f9d82895bb3e3c6b065f71beb9222/standard/download-11-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=754f9d82895bb3e3c6b065f71beb9222&amp;source=podcast&amp;photo%5fid=112989989" width="625" height="352" type="text/html" medium="video" duration="2405" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968567/112989989/754f9d82895bb3e3c6b065f71beb9222/standard/download-11-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968567/112989989/754f9d82895bb3e3c6b065f71beb9222/standard/download-11-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968578/110765597/3ab5dbd28849bfce147a96abdf0e5385/video_medium/customer-story-q42-1-video.mp4?source=podcast" type="video/mp4" length="126596410"/>
            <title>Customer Story Q42</title>
            <link>http://videos.elimity.com/customer-story-q42-1</link>
            <description>&lt;p&gt;&lt;h1&gt;Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity&lt;/h1&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Join us for a session with our customer&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en"&gt;&lt;strong&gt;&lt;u&gt;Q42&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;. The strategic technology agency, part of the Nordic consultancy collective&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://eidra.com/"&gt;&lt;u&gt;Eidra&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;builds digital products with renowned brands like&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/philips-hue1"&gt;&lt;u&gt;Philips Hue&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/hema"&gt;&lt;u&gt;HEMA&lt;/u&gt;&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/rijks-website1"&gt;&lt;u&gt;Rijksmuseum&lt;/u&gt;&lt;/a&gt;. Q42's COO Jasper Kaizer shares their journey with Elimity and how they gained strict control over user access to meet ISO 27001 certification requirements.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;What to Expect?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ &lt;strong&gt;Challenges &amp;amp; Solutions:&lt;/strong&gt; Learn how Q42 tackled identity governance challenges and why they needed a lightweight solution that seamlessly connects to their crucial systems.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Q42’s Perspective:&lt;/strong&gt; Hear from Jasper Kaizer, COO of Q42, on their journey to improved security and compliance readiness.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Live Demo:&lt;/strong&gt; See how Elimity enables fast and efficient user access management without the complexity.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128467;️ &lt;strong&gt;Date&lt;/strong&gt;: March 12th at 4:00 PM CET&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;Your Hosts?&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/maartendecat/"&gt;&lt;u&gt;Maarten Decat&lt;/u&gt;&lt;/a&gt;: VP Product and Co-Founder Elimity&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/jkaizer/ "&gt;&lt;u&gt;Jasper Kaizer&lt;/u&gt;&lt;/a&gt;: Chief Operational Officer Q42&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128640; &lt;strong&gt;Don’t miss out—register now to secure your spot!&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/customer-story-q42-1"&gt;&lt;img src="http://videos.elimity.com/64968578/110765597/3ab5dbd28849bfce147a96abdf0e5385/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/110765597</guid>
            <pubDate>Wed, 19 Mar 2025 08:55:00 GMT</pubDate>
            <media:title>Customer Story Q42</media:title>
            <itunes:summary>Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity
Join us for a session with our customerQ42. The strategic technology agency, part of the Nordic consultancy collectiveEidra,builds digital products with renowned brands likePhilips Hue,HEMAandRijksmuseum. Q42's COO Jasper Kaizer shares their journey with Elimity and how they gained strict control over user access to meet ISO 27001 certification requirements.

What to Expect?

✅ Challenges  Solutions: Learn how Q42 tackled identity governance challenges and why they needed a lightweight solution that seamlessly connects to their crucial systems.
✅ Q42’s Perspective: Hear from Jasper Kaizer, COO of Q42, on their journey to improved security and compliance readiness.
✅ Live Demo: See how Elimity enables fast and efficient user access management without the complexity.

&#128467;️ Date: March 12th at 4:00 PM CET

Your Hosts?
Maarten Decat: VP Product and Co-Founder Elimity
Jasper Kaizer: Chief Operational Officer Q42

&#128640; Don’t miss out—register now to secure your spot!

</itunes:summary>
            <itunes:subtitle>Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity
Join us for a session with our customerQ42. The strategic technology agency, part of the Nordic consultancy collectiveEidra,builds digital products with...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>43:56</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;h1&gt;Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity&lt;/h1&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Join us for a session with our customer&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en"&gt;&lt;strong&gt;&lt;u&gt;Q42&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;. The strategic technology agency, part of the Nordic consultancy collective&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://eidra.com/"&gt;&lt;u&gt;Eidra&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;builds digital products with renowned brands like&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/philips-hue1"&gt;&lt;u&gt;Philips Hue&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/hema"&gt;&lt;u&gt;HEMA&lt;/u&gt;&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/rijks-website1"&gt;&lt;u&gt;Rijksmuseum&lt;/u&gt;&lt;/a&gt;. Q42's COO Jasper Kaizer shares their journey with Elimity and how they gained strict control over user access to meet ISO 27001 certification requirements.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;What to Expect?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ &lt;strong&gt;Challenges &amp;amp; Solutions:&lt;/strong&gt; Learn how Q42 tackled identity governance challenges and why they needed a lightweight solution that seamlessly connects to their crucial systems.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Q42’s Perspective:&lt;/strong&gt; Hear from Jasper Kaizer, COO of Q42, on their journey to improved security and compliance readiness.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Live Demo:&lt;/strong&gt; See how Elimity enables fast and efficient user access management without the complexity.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128467;️ &lt;strong&gt;Date&lt;/strong&gt;: March 12th at 4:00 PM CET&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;Your Hosts?&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/maartendecat/"&gt;&lt;u&gt;Maarten Decat&lt;/u&gt;&lt;/a&gt;: VP Product and Co-Founder Elimity&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/jkaizer/ "&gt;&lt;u&gt;Jasper Kaizer&lt;/u&gt;&lt;/a&gt;: Chief Operational Officer Q42&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128640; &lt;strong&gt;Don’t miss out—register now to secure your spot!&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/customer-story-q42-1"&gt;&lt;img src="http://videos.elimity.com/64968578/110765597/3ab5dbd28849bfce147a96abdf0e5385/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=3ab5dbd28849bfce147a96abdf0e5385&amp;source=podcast&amp;photo%5fid=110765597" width="625" height="352" type="text/html" medium="video" duration="2636" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968578/110765597/3ab5dbd28849bfce147a96abdf0e5385/standard/download-9-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968578/110765597/3ab5dbd28849bfce147a96abdf0e5385/standard/download-9-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968558/110979408/17633a54a4da9dd0a201c3e362cba3c6/video_medium/why-did-q42-go-for-iso-27001-1-video.mp4?source=podcast" type="video/mp4" length="3343029"/>
            <title>Why did Q42 go for ISO 27001 Certification? ✅</title>
            <link>http://videos.elimity.com/why-did-q42-go-for-iso-27001-1</link>
            <description>&lt;p&gt;Customer Q42 pursued ISO 27001 certification to enhance their information security practices and meet industry standards.&lt;/p&gt;
&lt;p&gt;This certification is internationally recognized and demonstrates a commitment to managing information securely, which is crucial for engaging in international projects like #Hacktheplanet. Additionally, achieving ISO 27001 helps improve the overall security posture of the organization, ensuring that data is protected against potential threats.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/why-did-q42-go-for-iso-27001-1"&gt;&lt;img src="http://videos.elimity.com/64968558/110979408/17633a54a4da9dd0a201c3e362cba3c6/standard/download-15-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/110979408</guid>
            <pubDate>Wed, 19 Mar 2025 08:55:00 GMT</pubDate>
            <media:title>Why did Q42 go for ISO 27001 Certification? ✅</media:title>
            <itunes:summary>Customer Q42 pursued ISO 27001 certification to enhance their information security practices and meet industry standards.
This certification is internationally recognized and demonstrates a commitment to managing information securely, which is crucial for engaging in international projects like #Hacktheplanet. Additionally, achieving ISO 27001 helps improve the overall security posture of the organization, ensuring that data is protected against potential threats.</itunes:summary>
            <itunes:subtitle>Customer Q42 pursued ISO 27001 certification to enhance their information security practices and meet industry standards.
This certification is internationally recognized and demonstrates a commitment to managing information securely, which is...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:04</itunes:duration>
            <media:description type="html">&lt;p&gt;Customer Q42 pursued ISO 27001 certification to enhance their information security practices and meet industry standards.&lt;/p&gt;
&lt;p&gt;This certification is internationally recognized and demonstrates a commitment to managing information securely, which is crucial for engaging in international projects like #Hacktheplanet. Additionally, achieving ISO 27001 helps improve the overall security posture of the organization, ensuring that data is protected against potential threats.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/why-did-q42-go-for-iso-27001-1"&gt;&lt;img src="http://videos.elimity.com/64968558/110979408/17633a54a4da9dd0a201c3e362cba3c6/standard/download-15-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=17633a54a4da9dd0a201c3e362cba3c6&amp;source=podcast&amp;photo%5fid=110979408" width="625" height="352" type="text/html" medium="video" duration="64" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968558/110979408/17633a54a4da9dd0a201c3e362cba3c6/standard/download-15-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968558/110979408/17633a54a4da9dd0a201c3e362cba3c6/standard/download-15-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968580/110976294/e7d965752c8b7c653ca93aa35df77278/video_medium/why-did-q42-choose-for-elimity-video.mp4?source=podcast" type="video/mp4" length="7751845"/>
            <title>Why did Q42 choose for Elimity?</title>
            <link>http://videos.elimity.com/why-did-q42-choose-for-elimity</link>
            <description>&lt;p&gt;&lt;h1&gt;Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity&lt;/h1&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Join us for a session with our customer&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en"&gt;&lt;strong&gt;&lt;u&gt;Q42&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;. The strategic technology agency, part of the Nordic consultancy collective&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://eidra.com/"&gt;&lt;u&gt;Eidra&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;builds digital products with renowned brands like&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/philips-hue1"&gt;&lt;u&gt;Philips Hue&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/hema"&gt;&lt;u&gt;HEMA&lt;/u&gt;&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/rijks-website1"&gt;&lt;u&gt;Rijksmuseum&lt;/u&gt;&lt;/a&gt;. Q42's COO Jasper Kaizer shares their journey with Elimity and how they gained strict control over user access to meet ISO 27001 certification requirements.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;What to Expect?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ &lt;strong&gt;Challenges &amp;amp; Solutions:&lt;/strong&gt; Learn how Q42 tackled identity governance challenges and why they needed a lightweight solution that seamlessly connects to their crucial systems.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Q42’s Perspective:&lt;/strong&gt; Hear from Jasper Kaizer, COO of Q42, on their journey to improved security and compliance readiness.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Live Demo:&lt;/strong&gt; See how Elimity enables fast and efficient user access management without the complexity.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128467;️ &lt;strong&gt;Date&lt;/strong&gt;: March 12th at 4:00 PM CET&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;Your Hosts?&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/maartendecat/"&gt;&lt;u&gt;Maarten Decat&lt;/u&gt;&lt;/a&gt;: VP Product and Co-Founder Elimity&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/jkaizer/ "&gt;&lt;u&gt;Jasper Kaizer&lt;/u&gt;&lt;/a&gt;: Chief Operational Officer Q42&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128640; &lt;strong&gt;Don’t miss out—register now to secure your spot!&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/why-did-q42-choose-for-elimity"&gt;&lt;img src="http://videos.elimity.com/64968580/110976294/e7d965752c8b7c653ca93aa35df77278/standard/download-19-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/110976294</guid>
            <pubDate>Wed, 19 Mar 2025 08:55:00 GMT</pubDate>
            <media:title>Why did Q42 choose for Elimity?</media:title>
            <itunes:summary>Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity
Join us for a session with our customerQ42. The strategic technology agency, part of the Nordic consultancy collectiveEidra,builds digital products with renowned brands likePhilips Hue,HEMAandRijksmuseum. Q42's COO Jasper Kaizer shares their journey with Elimity and how they gained strict control over user access to meet ISO 27001 certification requirements.

What to Expect?

✅ Challenges  Solutions: Learn how Q42 tackled identity governance challenges and why they needed a lightweight solution that seamlessly connects to their crucial systems.
✅ Q42’s Perspective: Hear from Jasper Kaizer, COO of Q42, on their journey to improved security and compliance readiness.
✅ Live Demo: See how Elimity enables fast and efficient user access management without the complexity.

&#128467;️ Date: March 12th at 4:00 PM CET

Your Hosts?
Maarten Decat: VP Product and Co-Founder Elimity
Jasper Kaizer: Chief Operational Officer Q42

&#128640; Don’t miss out—register now to secure your spot!

</itunes:summary>
            <itunes:subtitle>Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity
Join us for a session with our customerQ42. The strategic technology agency, part of the Nordic consultancy collectiveEidra,builds digital products with...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>02:59</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;h1&gt;Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity&lt;/h1&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Join us for a session with our customer&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en"&gt;&lt;strong&gt;&lt;u&gt;Q42&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;. The strategic technology agency, part of the Nordic consultancy collective&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://eidra.com/"&gt;&lt;u&gt;Eidra&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;builds digital products with renowned brands like&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/philips-hue1"&gt;&lt;u&gt;Philips Hue&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/hema"&gt;&lt;u&gt;HEMA&lt;/u&gt;&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/rijks-website1"&gt;&lt;u&gt;Rijksmuseum&lt;/u&gt;&lt;/a&gt;. Q42's COO Jasper Kaizer shares their journey with Elimity and how they gained strict control over user access to meet ISO 27001 certification requirements.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;What to Expect?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ &lt;strong&gt;Challenges &amp;amp; Solutions:&lt;/strong&gt; Learn how Q42 tackled identity governance challenges and why they needed a lightweight solution that seamlessly connects to their crucial systems.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Q42’s Perspective:&lt;/strong&gt; Hear from Jasper Kaizer, COO of Q42, on their journey to improved security and compliance readiness.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Live Demo:&lt;/strong&gt; See how Elimity enables fast and efficient user access management without the complexity.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128467;️ &lt;strong&gt;Date&lt;/strong&gt;: March 12th at 4:00 PM CET&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;Your Hosts?&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/maartendecat/"&gt;&lt;u&gt;Maarten Decat&lt;/u&gt;&lt;/a&gt;: VP Product and Co-Founder Elimity&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/jkaizer/ "&gt;&lt;u&gt;Jasper Kaizer&lt;/u&gt;&lt;/a&gt;: Chief Operational Officer Q42&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128640; &lt;strong&gt;Don’t miss out—register now to secure your spot!&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/why-did-q42-choose-for-elimity"&gt;&lt;img src="http://videos.elimity.com/64968580/110976294/e7d965752c8b7c653ca93aa35df77278/standard/download-19-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=e7d965752c8b7c653ca93aa35df77278&amp;source=podcast&amp;photo%5fid=110976294" width="625" height="352" type="text/html" medium="video" duration="179" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968580/110976294/e7d965752c8b7c653ca93aa35df77278/standard/download-19-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968580/110976294/e7d965752c8b7c653ca93aa35df77278/standard/download-19-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968580/110976291/5153abb03dbd8cd7e01acda7a6f556aa/video_medium/what-was-q42s-approach-to-identity-video.mp4?source=podcast" type="video/mp4" length="6615042"/>
            <title>What was Q42's approach to Identity Governance? </title>
            <link>http://videos.elimity.com/what-was-q42s-approach-to-identity</link>
            <description>&lt;p&gt;&lt;h1&gt;Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity&lt;/h1&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Join us for a session with our customer&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en"&gt;&lt;strong&gt;&lt;u&gt;Q42&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;. The strategic technology agency, part of the Nordic consultancy collective&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://eidra.com/"&gt;&lt;u&gt;Eidra&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;builds digital products with renowned brands like&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/philips-hue1"&gt;&lt;u&gt;Philips Hue&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/hema"&gt;&lt;u&gt;HEMA&lt;/u&gt;&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/rijks-website1"&gt;&lt;u&gt;Rijksmuseum&lt;/u&gt;&lt;/a&gt;. Q42's COO Jasper Kaizer shares their journey with Elimity and how they gained strict control over user access to meet ISO 27001 certification requirements.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;What to Expect?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ &lt;strong&gt;Challenges &amp;amp; Solutions:&lt;/strong&gt; Learn how Q42 tackled identity governance challenges and why they needed a lightweight solution that seamlessly connects to their crucial systems.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Q42’s Perspective:&lt;/strong&gt; Hear from Jasper Kaizer, COO of Q42, on their journey to improved security and compliance readiness.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Live Demo:&lt;/strong&gt; See how Elimity enables fast and efficient user access management without the complexity.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128467;️ &lt;strong&gt;Date&lt;/strong&gt;: March 12th at 4:00 PM CET&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;Your Hosts?&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/maartendecat/"&gt;&lt;u&gt;Maarten Decat&lt;/u&gt;&lt;/a&gt;: VP Product and Co-Founder Elimity&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/jkaizer/ "&gt;&lt;u&gt;Jasper Kaizer&lt;/u&gt;&lt;/a&gt;: Chief Operational Officer Q42&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128640; &lt;strong&gt;Don’t miss out—register now to secure your spot!&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/what-was-q42s-approach-to-identity"&gt;&lt;img src="http://videos.elimity.com/64968580/110976291/5153abb03dbd8cd7e01acda7a6f556aa/standard/download-17-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/110976291</guid>
            <pubDate>Wed, 19 Mar 2025 08:55:00 GMT</pubDate>
            <media:title>What was Q42's approach to Identity Governance? </media:title>
            <itunes:summary>Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity
Join us for a session with our customerQ42. The strategic technology agency, part of the Nordic consultancy collectiveEidra,builds digital products with renowned brands likePhilips Hue,HEMAandRijksmuseum. Q42's COO Jasper Kaizer shares their journey with Elimity and how they gained strict control over user access to meet ISO 27001 certification requirements.

What to Expect?

✅ Challenges  Solutions: Learn how Q42 tackled identity governance challenges and why they needed a lightweight solution that seamlessly connects to their crucial systems.
✅ Q42’s Perspective: Hear from Jasper Kaizer, COO of Q42, on their journey to improved security and compliance readiness.
✅ Live Demo: See how Elimity enables fast and efficient user access management without the complexity.

&#128467;️ Date: March 12th at 4:00 PM CET

Your Hosts?
Maarten Decat: VP Product and Co-Founder Elimity
Jasper Kaizer: Chief Operational Officer Q42

&#128640; Don’t miss out—register now to secure your spot!

</itunes:summary>
            <itunes:subtitle>Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity
Join us for a session with our customerQ42. The strategic technology agency, part of the Nordic consultancy collectiveEidra,builds digital products with...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>02:43</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;h1&gt;Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity&lt;/h1&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Join us for a session with our customer&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en"&gt;&lt;strong&gt;&lt;u&gt;Q42&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;. The strategic technology agency, part of the Nordic consultancy collective&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://eidra.com/"&gt;&lt;u&gt;Eidra&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;builds digital products with renowned brands like&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/philips-hue1"&gt;&lt;u&gt;Philips Hue&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/hema"&gt;&lt;u&gt;HEMA&lt;/u&gt;&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/rijks-website1"&gt;&lt;u&gt;Rijksmuseum&lt;/u&gt;&lt;/a&gt;. Q42's COO Jasper Kaizer shares their journey with Elimity and how they gained strict control over user access to meet ISO 27001 certification requirements.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;What to Expect?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ &lt;strong&gt;Challenges &amp;amp; Solutions:&lt;/strong&gt; Learn how Q42 tackled identity governance challenges and why they needed a lightweight solution that seamlessly connects to their crucial systems.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Q42’s Perspective:&lt;/strong&gt; Hear from Jasper Kaizer, COO of Q42, on their journey to improved security and compliance readiness.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Live Demo:&lt;/strong&gt; See how Elimity enables fast and efficient user access management without the complexity.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128467;️ &lt;strong&gt;Date&lt;/strong&gt;: March 12th at 4:00 PM CET&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;Your Hosts?&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/maartendecat/"&gt;&lt;u&gt;Maarten Decat&lt;/u&gt;&lt;/a&gt;: VP Product and Co-Founder Elimity&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/jkaizer/ "&gt;&lt;u&gt;Jasper Kaizer&lt;/u&gt;&lt;/a&gt;: Chief Operational Officer Q42&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128640; &lt;strong&gt;Don’t miss out—register now to secure your spot!&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/what-was-q42s-approach-to-identity"&gt;&lt;img src="http://videos.elimity.com/64968580/110976291/5153abb03dbd8cd7e01acda7a6f556aa/standard/download-17-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=5153abb03dbd8cd7e01acda7a6f556aa&amp;source=podcast&amp;photo%5fid=110976291" width="625" height="352" type="text/html" medium="video" duration="163" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968580/110976291/5153abb03dbd8cd7e01acda7a6f556aa/standard/download-17-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968580/110976291/5153abb03dbd8cd7e01acda7a6f556aa/standard/download-17-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968580/110976287/72fba439568130226ad1b3e02209afcc/video_medium/why-did-q42-go-for-iso-27001-video.mp4?source=podcast" type="video/mp4" length="3373386"/>
            <title>Why did Q42 go for ISO 27001 Certification? &#128272;</title>
            <link>http://videos.elimity.com/why-did-q42-go-for-iso-27001</link>
            <description>&lt;p&gt;&lt;h1&gt;Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity&lt;/h1&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Join us for a session with our customer&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en"&gt;&lt;strong&gt;&lt;u&gt;Q42&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;. The strategic technology agency, part of the Nordic consultancy collective&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://eidra.com/"&gt;&lt;u&gt;Eidra&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;builds digital products with renowned brands like&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/philips-hue1"&gt;&lt;u&gt;Philips Hue&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/hema"&gt;&lt;u&gt;HEMA&lt;/u&gt;&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/rijks-website1"&gt;&lt;u&gt;Rijksmuseum&lt;/u&gt;&lt;/a&gt;. Q42's COO Jasper Kaizer shares their journey with Elimity and how they gained strict control over user access to meet ISO 27001 certification requirements.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;What to Expect?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ &lt;strong&gt;Challenges &amp;amp; Solutions:&lt;/strong&gt; Learn how Q42 tackled identity governance challenges and why they needed a lightweight solution that seamlessly connects to their crucial systems.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Q42’s Perspective:&lt;/strong&gt; Hear from Jasper Kaizer, COO of Q42, on their journey to improved security and compliance readiness.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Live Demo:&lt;/strong&gt; See how Elimity enables fast and efficient user access management without the complexity.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128467;️ &lt;strong&gt;Date&lt;/strong&gt;: March 12th at 4:00 PM CET&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;Your Hosts?&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/maartendecat/"&gt;&lt;u&gt;Maarten Decat&lt;/u&gt;&lt;/a&gt;: VP Product and Co-Founder Elimity&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/jkaizer/ "&gt;&lt;u&gt;Jasper Kaizer&lt;/u&gt;&lt;/a&gt;: Chief Operational Officer Q42&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128640; &lt;strong&gt;Don’t miss out—register now to secure your spot!&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/why-did-q42-go-for-iso-27001"&gt;&lt;img src="http://videos.elimity.com/64968580/110976287/72fba439568130226ad1b3e02209afcc/standard/download-26-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/110976287</guid>
            <pubDate>Wed, 19 Mar 2025 08:55:00 GMT</pubDate>
            <media:title>Why did Q42 go for ISO 27001 Certification? &#128272;</media:title>
            <itunes:summary>Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity
Join us for a session with our customerQ42. The strategic technology agency, part of the Nordic consultancy collectiveEidra,builds digital products with renowned brands likePhilips Hue,HEMAandRijksmuseum. Q42's COO Jasper Kaizer shares their journey with Elimity and how they gained strict control over user access to meet ISO 27001 certification requirements.

What to Expect?

✅ Challenges  Solutions: Learn how Q42 tackled identity governance challenges and why they needed a lightweight solution that seamlessly connects to their crucial systems.
✅ Q42’s Perspective: Hear from Jasper Kaizer, COO of Q42, on their journey to improved security and compliance readiness.
✅ Live Demo: See how Elimity enables fast and efficient user access management without the complexity.

&#128467;️ Date: March 12th at 4:00 PM CET

Your Hosts?
Maarten Decat: VP Product and Co-Founder Elimity
Jasper Kaizer: Chief Operational Officer Q42

&#128640; Don’t miss out—register now to secure your spot!

</itunes:summary>
            <itunes:subtitle>Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity
Join us for a session with our customerQ42. The strategic technology agency, part of the Nordic consultancy collectiveEidra,builds digital products with...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:04</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;h1&gt;Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity&lt;/h1&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Join us for a session with our customer&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en"&gt;&lt;strong&gt;&lt;u&gt;Q42&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;. The strategic technology agency, part of the Nordic consultancy collective&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://eidra.com/"&gt;&lt;u&gt;Eidra&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;builds digital products with renowned brands like&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/philips-hue1"&gt;&lt;u&gt;Philips Hue&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/hema"&gt;&lt;u&gt;HEMA&lt;/u&gt;&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/rijks-website1"&gt;&lt;u&gt;Rijksmuseum&lt;/u&gt;&lt;/a&gt;. Q42's COO Jasper Kaizer shares their journey with Elimity and how they gained strict control over user access to meet ISO 27001 certification requirements.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;What to Expect?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ &lt;strong&gt;Challenges &amp;amp; Solutions:&lt;/strong&gt; Learn how Q42 tackled identity governance challenges and why they needed a lightweight solution that seamlessly connects to their crucial systems.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Q42’s Perspective:&lt;/strong&gt; Hear from Jasper Kaizer, COO of Q42, on their journey to improved security and compliance readiness.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Live Demo:&lt;/strong&gt; See how Elimity enables fast and efficient user access management without the complexity.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128467;️ &lt;strong&gt;Date&lt;/strong&gt;: March 12th at 4:00 PM CET&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;Your Hosts?&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/maartendecat/"&gt;&lt;u&gt;Maarten Decat&lt;/u&gt;&lt;/a&gt;: VP Product and Co-Founder Elimity&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/jkaizer/ "&gt;&lt;u&gt;Jasper Kaizer&lt;/u&gt;&lt;/a&gt;: Chief Operational Officer Q42&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128640; &lt;strong&gt;Don’t miss out—register now to secure your spot!&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/why-did-q42-go-for-iso-27001"&gt;&lt;img src="http://videos.elimity.com/64968580/110976287/72fba439568130226ad1b3e02209afcc/standard/download-26-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=72fba439568130226ad1b3e02209afcc&amp;source=podcast&amp;photo%5fid=110976287" width="625" height="352" type="text/html" medium="video" duration="64" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968580/110976287/72fba439568130226ad1b3e02209afcc/standard/download-26-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968580/110976287/72fba439568130226ad1b3e02209afcc/standard/download-26-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968580/110976280/3eca7d7c1ded91417fef7f76525a7426/video_medium/what-were-q42s-identity-challenges-video.mp4?source=podcast" type="video/mp4" length="4811946"/>
            <title>What were Q42's Identity Challenges? </title>
            <link>http://videos.elimity.com/what-were-q42s-identity-challenges</link>
            <description>&lt;p&gt;&lt;h1&gt;Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity&lt;/h1&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Join us for a session with our customer&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en"&gt;&lt;strong&gt;&lt;u&gt;Q42&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;. The strategic technology agency, part of the Nordic consultancy collective&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://eidra.com/"&gt;&lt;u&gt;Eidra&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;builds digital products with renowned brands like&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/philips-hue1"&gt;&lt;u&gt;Philips Hue&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/hema"&gt;&lt;u&gt;HEMA&lt;/u&gt;&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/rijks-website1"&gt;&lt;u&gt;Rijksmuseum&lt;/u&gt;&lt;/a&gt;. Q42's COO Jasper Kaizer shares their journey with Elimity and how they gained strict control over user access to meet ISO 27001 certification requirements.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;What to Expect?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ &lt;strong&gt;Challenges &amp;amp; Solutions:&lt;/strong&gt; Learn how Q42 tackled identity governance challenges and why they needed a lightweight solution that seamlessly connects to their crucial systems.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Q42’s Perspective:&lt;/strong&gt; Hear from Jasper Kaizer, COO of Q42, on their journey to improved security and compliance readiness.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Live Demo:&lt;/strong&gt; See how Elimity enables fast and efficient user access management without the complexity.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128467;️ &lt;strong&gt;Date&lt;/strong&gt;: March 12th at 4:00 PM CET&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;Your Hosts?&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/maartendecat/"&gt;&lt;u&gt;Maarten Decat&lt;/u&gt;&lt;/a&gt;: VP Product and Co-Founder Elimity&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/jkaizer/ "&gt;&lt;u&gt;Jasper Kaizer&lt;/u&gt;&lt;/a&gt;: Chief Operational Officer Q42&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128640; &lt;strong&gt;Don’t miss out—register now to secure your spot!&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/what-were-q42s-identity-challenges"&gt;&lt;img src="http://videos.elimity.com/64968580/110976280/3eca7d7c1ded91417fef7f76525a7426/standard/download-17-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/110976280</guid>
            <pubDate>Wed, 19 Mar 2025 08:55:00 GMT</pubDate>
            <media:title>What were Q42's Identity Challenges? </media:title>
            <itunes:summary>Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity
Join us for a session with our customerQ42. The strategic technology agency, part of the Nordic consultancy collectiveEidra,builds digital products with renowned brands likePhilips Hue,HEMAandRijksmuseum. Q42's COO Jasper Kaizer shares their journey with Elimity and how they gained strict control over user access to meet ISO 27001 certification requirements.

What to Expect?

✅ Challenges  Solutions: Learn how Q42 tackled identity governance challenges and why they needed a lightweight solution that seamlessly connects to their crucial systems.
✅ Q42’s Perspective: Hear from Jasper Kaizer, COO of Q42, on their journey to improved security and compliance readiness.
✅ Live Demo: See how Elimity enables fast and efficient user access management without the complexity.

&#128467;️ Date: March 12th at 4:00 PM CET

Your Hosts?
Maarten Decat: VP Product and Co-Founder Elimity
Jasper Kaizer: Chief Operational Officer Q42

&#128640; Don’t miss out—register now to secure your spot!

</itunes:summary>
            <itunes:subtitle>Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity
Join us for a session with our customerQ42. The strategic technology agency, part of the Nordic consultancy collectiveEidra,builds digital products with...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:45</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;h1&gt;Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity&lt;/h1&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Join us for a session with our customer&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en"&gt;&lt;strong&gt;&lt;u&gt;Q42&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;. The strategic technology agency, part of the Nordic consultancy collective&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://eidra.com/"&gt;&lt;u&gt;Eidra&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;builds digital products with renowned brands like&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/philips-hue1"&gt;&lt;u&gt;Philips Hue&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/hema"&gt;&lt;u&gt;HEMA&lt;/u&gt;&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/rijks-website1"&gt;&lt;u&gt;Rijksmuseum&lt;/u&gt;&lt;/a&gt;. Q42's COO Jasper Kaizer shares their journey with Elimity and how they gained strict control over user access to meet ISO 27001 certification requirements.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;What to Expect?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ &lt;strong&gt;Challenges &amp;amp; Solutions:&lt;/strong&gt; Learn how Q42 tackled identity governance challenges and why they needed a lightweight solution that seamlessly connects to their crucial systems.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Q42’s Perspective:&lt;/strong&gt; Hear from Jasper Kaizer, COO of Q42, on their journey to improved security and compliance readiness.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Live Demo:&lt;/strong&gt; See how Elimity enables fast and efficient user access management without the complexity.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128467;️ &lt;strong&gt;Date&lt;/strong&gt;: March 12th at 4:00 PM CET&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;Your Hosts?&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/maartendecat/"&gt;&lt;u&gt;Maarten Decat&lt;/u&gt;&lt;/a&gt;: VP Product and Co-Founder Elimity&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/jkaizer/ "&gt;&lt;u&gt;Jasper Kaizer&lt;/u&gt;&lt;/a&gt;: Chief Operational Officer Q42&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128640; &lt;strong&gt;Don’t miss out—register now to secure your spot!&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/what-were-q42s-identity-challenges"&gt;&lt;img src="http://videos.elimity.com/64968580/110976280/3eca7d7c1ded91417fef7f76525a7426/standard/download-17-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=3eca7d7c1ded91417fef7f76525a7426&amp;source=podcast&amp;photo%5fid=110976280" width="625" height="352" type="text/html" medium="video" duration="105" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968580/110976280/3eca7d7c1ded91417fef7f76525a7426/standard/download-17-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968580/110976280/3eca7d7c1ded91417fef7f76525a7426/standard/download-17-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968580/109396985/1cad2bbb74dd6fa233e37c9f63cbddeb/video_medium/how-to-prove-that-you-are-in-1-video.mp4?source=podcast" type="video/mp4" length="27156778"/>
            <title>How to prove that you are in control</title>
            <link>http://videos.elimity.com/how-to-prove-that-you-are-in-1</link>
            <description>&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/how-to-prove-that-you-are-in-1"&gt;&lt;img src="http://videos.elimity.com/64968580/109396985/1cad2bbb74dd6fa233e37c9f63cbddeb/standard/download-13-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/109396985</guid>
            <pubDate>Thu, 30 Jan 2025 13:56:33 GMT</pubDate>
            <media:title>How to prove that you are in control</media:title>
            <itunes:summary></itunes:summary>
            <itunes:subtitle></itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>06:43</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/how-to-prove-that-you-are-in-1"&gt;&lt;img src="http://videos.elimity.com/64968580/109396985/1cad2bbb74dd6fa233e37c9f63cbddeb/standard/download-13-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=1cad2bbb74dd6fa233e37c9f63cbddeb&amp;source=podcast&amp;photo%5fid=109396985" width="625" height="352" type="text/html" medium="video" duration="403" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968580/109396985/1cad2bbb74dd6fa233e37c9f63cbddeb/standard/download-13-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968580/109396985/1cad2bbb74dd6fa233e37c9f63cbddeb/standard/download-13-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968579/108620350/635c62891d3cb94b59fd70300eee3538/video_medium/what-is-iga-light-1-video.mp4?source=podcast" type="video/mp4" length="121339775"/>
            <title>What is IGA Light? </title>
            <link>http://videos.elimity.com/what-is-iga-light-1</link>
            <description>&lt;p&gt;&lt;p&gt;Join Cloudworks and Elimity on January 9th for a practical session showcasing how Elimity’s IGA Light solution can improve the identity and access management (IAM) for your organization.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;hr&gt;&lt;h2&gt;&lt;strong&gt;What to Expect?&lt;/strong&gt;&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;strong&gt;Challenges &amp;amp; Solutions&lt;/strong&gt;: Understand the common IAM challenges organizations face and how Elimity’s IGA Light addresses them with simplicity and efficiency.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;strong&gt;Live Demo&lt;/strong&gt;: See Elimity’s IGA Light in action&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;strong&gt;Cloudworks Perspective&lt;/strong&gt;: Hear from Ivar Lyse, Customer Success Manager at Cloudworks, as he shares how Cloudworks complements and enhances your IAM strategy.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Don’t miss out—register now to secure your spot!&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/what-is-iga-light-1"&gt;&lt;img src="http://videos.elimity.com/64968579/108620350/635c62891d3cb94b59fd70300eee3538/standard/download-13-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/108620350</guid>
            <pubDate>Thu, 09 Jan 2025 10:34:30 GMT</pubDate>
            <media:title>What is IGA Light? </media:title>
            <itunes:summary>Join Cloudworks and Elimity on January 9th for a practical session showcasing how Elimity’s IGA Light solution can improve the identity and access management (IAM) for your organization.

What to Expect?Challenges  Solutions: Understand the common IAM challenges organizations face and how Elimity’s IGA Light addresses them with simplicity and efficiency.
Live Demo: See Elimity’s IGA Light in action
Cloudworks Perspective: Hear from Ivar Lyse, Customer Success Manager at Cloudworks, as he shares how Cloudworks complements and enhances your IAM strategy.

Don’t miss out—register now to secure your spot!
</itunes:summary>
            <itunes:subtitle>Join Cloudworks and Elimity on January 9th for a practical session showcasing how Elimity’s IGA Light solution can improve the identity and access management (IAM) for your organization.

What to Expect?Challenges  Solutions: Understand the common...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>47:20</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;p&gt;Join Cloudworks and Elimity on January 9th for a practical session showcasing how Elimity’s IGA Light solution can improve the identity and access management (IAM) for your organization.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;hr&gt;&lt;h2&gt;&lt;strong&gt;What to Expect?&lt;/strong&gt;&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;strong&gt;Challenges &amp;amp; Solutions&lt;/strong&gt;: Understand the common IAM challenges organizations face and how Elimity’s IGA Light addresses them with simplicity and efficiency.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;strong&gt;Live Demo&lt;/strong&gt;: See Elimity’s IGA Light in action&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;strong&gt;Cloudworks Perspective&lt;/strong&gt;: Hear from Ivar Lyse, Customer Success Manager at Cloudworks, as he shares how Cloudworks complements and enhances your IAM strategy.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Don’t miss out—register now to secure your spot!&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/what-is-iga-light-1"&gt;&lt;img src="http://videos.elimity.com/64968579/108620350/635c62891d3cb94b59fd70300eee3538/standard/download-13-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=635c62891d3cb94b59fd70300eee3538&amp;source=podcast&amp;photo%5fid=108620350" width="625" height="186" type="text/html" medium="video" duration="2840" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968579/108620350/635c62891d3cb94b59fd70300eee3538/standard/download-13-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968579/108620350/635c62891d3cb94b59fd70300eee3538/standard/download-13-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968555/108652521/67c8149f682d4e391f8b91afa7d501fe/video_medium/the-challenge-manual-access-reviews-video.mp4?source=podcast" type="video/mp4" length="1627402"/>
            <title>The Challenge: Manual Access Reviews</title>
            <link>http://videos.elimity.com/the-challenge-manual-access-reviews</link>
            <description>&lt;p&gt;In this short clip from our webinar “What is IGA Light”, Ivar Lyse (Customer Success at Cloudworks) highlights the biggest hurdles organisations face with access reviews:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1️⃣ Need for Access Reviews due to Compliance requirements (GXP, ISO27001)&lt;/p&gt;
&lt;p&gt;2️⃣ Self-developed Excel-based access reviews&lt;/p&gt;
&lt;p&gt;3️⃣ Extremely complex IAM landscape with multiple systems and directories&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Learn why these issues lead to inefficiencies, high costs, and increased risks—and how modern solutions can help.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/the-challenge-manual-access-reviews"&gt;&lt;img src="http://videos.elimity.com/64968555/108652521/67c8149f682d4e391f8b91afa7d501fe/standard/download-15-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/108652521</guid>
            <pubDate>Thu, 09 Jan 2025 10:34:30 GMT</pubDate>
            <media:title>The Challenge: Manual Access Reviews</media:title>
            <itunes:summary>In this short clip from our webinar “What is IGA Light”, Ivar Lyse (Customer Success at Cloudworks) highlights the biggest hurdles organisations face with access reviews:



1️⃣ Need for Access Reviews due to Compliance requirements (GXP, ISO27001)
2️⃣ Self-developed Excel-based access reviews
3️⃣ Extremely complex IAM landscape with multiple systems and directories



Learn why these issues lead to inefficiencies, high costs, and increased risks—and how modern solutions can help.</itunes:summary>
            <itunes:subtitle>In this short clip from our webinar “What is IGA Light”, Ivar Lyse (Customer Success at Cloudworks) highlights the biggest hurdles organisations face with access reviews:



1️⃣ Need for Access Reviews due to Compliance requirements (GXP,...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>00:45</itunes:duration>
            <media:description type="html">&lt;p&gt;In this short clip from our webinar “What is IGA Light”, Ivar Lyse (Customer Success at Cloudworks) highlights the biggest hurdles organisations face with access reviews:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1️⃣ Need for Access Reviews due to Compliance requirements (GXP, ISO27001)&lt;/p&gt;
&lt;p&gt;2️⃣ Self-developed Excel-based access reviews&lt;/p&gt;
&lt;p&gt;3️⃣ Extremely complex IAM landscape with multiple systems and directories&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Learn why these issues lead to inefficiencies, high costs, and increased risks—and how modern solutions can help.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/the-challenge-manual-access-reviews"&gt;&lt;img src="http://videos.elimity.com/64968555/108652521/67c8149f682d4e391f8b91afa7d501fe/standard/download-15-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=67c8149f682d4e391f8b91afa7d501fe&amp;source=podcast&amp;photo%5fid=108652521" width="625" height="352" type="text/html" medium="video" duration="45" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968555/108652521/67c8149f682d4e391f8b91afa7d501fe/standard/download-15-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968555/108652521/67c8149f682d4e391f8b91afa7d501fe/standard/download-15-thumbnail.jpg/thumbnail.jpg"/>
            <category>Access Reviews</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968571/106547658/00ddb6d694c41edc5fcb408d0dc06170/video_medium/5-tips-to-take-control-of-user-4-video.mp4?source=podcast" type="video/mp4" length="113586807"/>
            <title>5 Tips To Take Control of User Access Within Days</title>
            <link>http://videos.elimity.com/5-tips-to-take-control-of-user-4</link>
            <description>&lt;p&gt;&lt;h1&gt;Learn how to take control of your users and their accesses with Elimity and Cegeka.&amp;nbsp;&lt;/h1&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;With over 90% of attacks exploiting user access, controlling user access has become key to achieving &lt;strong&gt;#NIS2 compliance&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: start"&gt;However, user &lt;strong&gt;access governance projects&lt;/strong&gt; have a history of incurring multi-year roll-outs and requiring specialized personnel, making many companies shy away and bear excessive cyber risk.&lt;/p&gt;
&lt;p style="text-align: start"&gt;&lt;/p&gt;
&lt;p style="text-align: start"&gt;&lt;/p&gt;
&lt;p style="text-align: start"&gt;&lt;strong&gt;&lt;u&gt;What to expect?&amp;nbsp;&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;On November 19th at 11:00 AM CET, the experts of Cegeka, European leader in digital services and Elimity will host a session to cover:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ Partnership between Cegeka and Elimity&lt;/p&gt;
&lt;p&gt;✅ Why do organisations need to take control of user access?&lt;/p&gt;
&lt;p&gt;✅ How to achieve this within days?&lt;/p&gt;
&lt;p&gt;✅ Case Study: Achieving NIS2 Compliance with Limited Resources&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;Your Hosts?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This webinar is hosted by Cegeka, the leading European IT solutions provider, alongside the experts of Elimity.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The platform Elimity Insights is the lightweight identity governance solution that allows security teams to take control of user access within days.&lt;/p&gt;
&lt;p style="text-align: start"&gt;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/5-tips-to-take-control-of-user-4"&gt;&lt;img src="http://videos.elimity.com/64968571/106547658/00ddb6d694c41edc5fcb408d0dc06170/standard/download-7-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/106547658</guid>
            <pubDate>Wed, 20 Nov 2024 08:21:25 GMT</pubDate>
            <media:title>5 Tips To Take Control of User Access Within Days</media:title>
            <itunes:summary>Learn how to take control of your users and their accesses with Elimity and Cegeka.
With over 90% of attacks exploiting user access, controlling user access has become key to achieving #NIS2 compliance.

However, user access governance projects have a history of incurring multi-year roll-outs and requiring specialized personnel, making many companies shy away and bear excessive cyber risk.


What to expect?
On November 19th at 11:00 AM CET, the experts of Cegeka, European leader in digital services and Elimity will host a session to cover:

✅ Partnership between Cegeka and Elimity
✅ Why do organisations need to take control of user access?
✅ How to achieve this within days?
✅ Case Study: Achieving NIS2 Compliance with Limited Resources

Your Hosts?
This webinar is hosted by Cegeka, the leading European IT solutions provider, alongside the experts of Elimity.

The platform Elimity Insights is the lightweight identity governance solution that allows security teams to take control of user access within days.

</itunes:summary>
            <itunes:subtitle>Learn how to take control of your users and their accesses with Elimity and Cegeka.
With over 90% of attacks exploiting user access, controlling user access has become key to achieving #NIS2 compliance.

However, user access governance projects...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>41:50</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;h1&gt;Learn how to take control of your users and their accesses with Elimity and Cegeka.&amp;nbsp;&lt;/h1&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;With over 90% of attacks exploiting user access, controlling user access has become key to achieving &lt;strong&gt;#NIS2 compliance&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: start"&gt;However, user &lt;strong&gt;access governance projects&lt;/strong&gt; have a history of incurring multi-year roll-outs and requiring specialized personnel, making many companies shy away and bear excessive cyber risk.&lt;/p&gt;
&lt;p style="text-align: start"&gt;&lt;/p&gt;
&lt;p style="text-align: start"&gt;&lt;/p&gt;
&lt;p style="text-align: start"&gt;&lt;strong&gt;&lt;u&gt;What to expect?&amp;nbsp;&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;On November 19th at 11:00 AM CET, the experts of Cegeka, European leader in digital services and Elimity will host a session to cover:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ Partnership between Cegeka and Elimity&lt;/p&gt;
&lt;p&gt;✅ Why do organisations need to take control of user access?&lt;/p&gt;
&lt;p&gt;✅ How to achieve this within days?&lt;/p&gt;
&lt;p&gt;✅ Case Study: Achieving NIS2 Compliance with Limited Resources&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;Your Hosts?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This webinar is hosted by Cegeka, the leading European IT solutions provider, alongside the experts of Elimity.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The platform Elimity Insights is the lightweight identity governance solution that allows security teams to take control of user access within days.&lt;/p&gt;
&lt;p style="text-align: start"&gt;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/5-tips-to-take-control-of-user-4"&gt;&lt;img src="http://videos.elimity.com/64968571/106547658/00ddb6d694c41edc5fcb408d0dc06170/standard/download-7-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=00ddb6d694c41edc5fcb408d0dc06170&amp;source=podcast&amp;photo%5fid=106547658" width="625" height="352" type="text/html" medium="video" duration="2510" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968571/106547658/00ddb6d694c41edc5fcb408d0dc06170/standard/download-7-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968571/106547658/00ddb6d694c41edc5fcb408d0dc06170/standard/download-7-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968561/105813653/590225621dafb96a7343729bddff5583/video_medium/elimity-on-kanaal-z-trends-video.mp4?source=podcast" type="video/mp4" length="8401467"/>
            <title>Elimity on Kanaal Z Trends</title>
            <link>http://videos.elimity.com/elimity-on-kanaal-z-trends</link>
            <description>&lt;p&gt;&lt;h1&gt;&lt;strong&gt;Samenwerkingen met Cegeka zet turbo op expansie van Elimity&lt;/strong&gt;&lt;/h1&gt;&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Belgium, [October 29rd, 2024]&lt;/strong&gt;&lt;em&gt; &lt;/em&gt;Sinds half oktober moeten Europese KMO’s en grote bedrijven in cruciale sectoren zich beter wapenen tegen cybercriminaliteit. De Vlaamse scale-up Elimity springt op de kar van die Europese NIS2-richtlijn. Het bedrijf ontwikkelde software voor het beheer van gebruikersaccounts. ICT-consultant Cegeka zet er mee z’n schouders onder?&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;The full interview:&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://trends.knack.be/kanaal-z/z-nieuws/bekijk-samenwerkingen-met-cegeka-zet-turbo-op-expansie-van-elimity/"&gt;&lt;a href="https://trends.knack.be/kanaal-z/z-nieuws/bekijk-samenwerkingen-met-cegeka-zet-turbo-op-expansie-van-elimity/"&gt;https://trends.knack.be/kanaal-z/z-nieuws/bekijk-samenwerkingen-met-cegeka-zet-turbo-op-expansie-van-elimity/&lt;/a&gt;&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/elimity-on-kanaal-z-trends"&gt;&lt;img src="http://videos.elimity.com/64968561/105813653/590225621dafb96a7343729bddff5583/standard/download-13-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/105813653</guid>
            <pubDate>Tue, 29 Oct 2024 11:33:54 GMT</pubDate>
            <media:title>Elimity on Kanaal Z Trends</media:title>
            <itunes:summary>Samenwerkingen met Cegeka zet turbo op expansie van Elimity

Belgium, [October 29rd, 2024] Sinds half oktober moeten Europese KMO’s en grote bedrijven in cruciale sectoren zich beter wapenen tegen cybercriminaliteit. De Vlaamse scale-up Elimity springt op de kar van die Europese NIS2-richtlijn. Het bedrijf ontwikkelde software voor het beheer van gebruikersaccounts. ICT-consultant Cegeka zet er mee z’n schouders onder?

The full interview:https://trends.knack.be/kanaal-z/z-nieuws/bekijk-samenwerkingen-met-cegeka-zet-turbo-op-expansie-van-elimity/


</itunes:summary>
            <itunes:subtitle>Samenwerkingen met Cegeka zet turbo op expansie van Elimity

Belgium, [October 29rd, 2024] Sinds half oktober moeten Europese KMO’s en grote bedrijven in cruciale sectoren zich beter wapenen tegen cybercriminaliteit. De Vlaamse scale-up Elimity...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>02:05</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;h1&gt;&lt;strong&gt;Samenwerkingen met Cegeka zet turbo op expansie van Elimity&lt;/strong&gt;&lt;/h1&gt;&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Belgium, [October 29rd, 2024]&lt;/strong&gt;&lt;em&gt; &lt;/em&gt;Sinds half oktober moeten Europese KMO’s en grote bedrijven in cruciale sectoren zich beter wapenen tegen cybercriminaliteit. De Vlaamse scale-up Elimity springt op de kar van die Europese NIS2-richtlijn. Het bedrijf ontwikkelde software voor het beheer van gebruikersaccounts. ICT-consultant Cegeka zet er mee z’n schouders onder?&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;The full interview:&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://trends.knack.be/kanaal-z/z-nieuws/bekijk-samenwerkingen-met-cegeka-zet-turbo-op-expansie-van-elimity/"&gt;&lt;a href="https://trends.knack.be/kanaal-z/z-nieuws/bekijk-samenwerkingen-met-cegeka-zet-turbo-op-expansie-van-elimity/"&gt;https://trends.knack.be/kanaal-z/z-nieuws/bekijk-samenwerkingen-met-cegeka-zet-turbo-op-expansie-van-elimity/&lt;/a&gt;&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/elimity-on-kanaal-z-trends"&gt;&lt;img src="http://videos.elimity.com/64968561/105813653/590225621dafb96a7343729bddff5583/standard/download-13-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=590225621dafb96a7343729bddff5583&amp;source=podcast&amp;photo%5fid=105813653" width="625" height="328" type="text/html" medium="video" duration="125" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968561/105813653/590225621dafb96a7343729bddff5583/standard/download-13-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968561/105813653/590225621dafb96a7343729bddff5583/standard/download-13-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968556/105467015/589b9d92fb750ad3294fcd7bbfa1ee35/video_medium/elimitys-identity-security-video.mp4?source=podcast" type="video/mp4" length="3418441"/>
            <title>Elimity's Identity Security Assessment &#128640;</title>
            <link>http://videos.elimity.com/elimitys-identity-security</link>
            <description>&lt;p&gt;&lt;h1&gt;&lt;strong&gt;Meet Elimity’s Identity Security Assessment&lt;/strong&gt;&lt;/h1&gt;&lt;p&gt;&lt;/p&gt;
&lt;h2&gt;Get rapid insights into your identity risks!&lt;/h2&gt;&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Elimity provides security teams with a one-time analysis of your users and their accesses with comprehensive reporting on identity risks, ensuring NIS2 and ISO 27001 certification proof, and delivered in just two weeks.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128073;&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://elimity.com/assessment"&gt;&lt;a href="https://elimity.com/assessment"&gt;https://elimity.com/assessment&lt;/a&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/elimitys-identity-security"&gt;&lt;img src="http://videos.elimity.com/64968556/105467015/589b9d92fb750ad3294fcd7bbfa1ee35/standard/download-25-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/105467015</guid>
            <pubDate>Mon, 21 Oct 2024 12:31:14 GMT</pubDate>
            <media:title>Elimity's Identity Security Assessment &#128640;</media:title>
            <itunes:summary>Meet Elimity’s Identity Security Assessment
Get rapid insights into your identity risks!
Elimity provides security teams with a one-time analysis of your users and their accesses with comprehensive reporting on identity risks, ensuring NIS2 and ISO 27001 certification proof, and delivered in just two weeks.

&#128073;https://elimity.com/assessment
</itunes:summary>
            <itunes:subtitle>Meet Elimity’s Identity Security Assessment
Get rapid insights into your identity risks!
Elimity provides security teams with a one-time analysis of your users and their accesses with comprehensive reporting on identity risks, ensuring NIS2 and...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:05</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;h1&gt;&lt;strong&gt;Meet Elimity’s Identity Security Assessment&lt;/strong&gt;&lt;/h1&gt;&lt;p&gt;&lt;/p&gt;
&lt;h2&gt;Get rapid insights into your identity risks!&lt;/h2&gt;&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Elimity provides security teams with a one-time analysis of your users and their accesses with comprehensive reporting on identity risks, ensuring NIS2 and ISO 27001 certification proof, and delivered in just two weeks.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128073;&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://elimity.com/assessment"&gt;&lt;a href="https://elimity.com/assessment"&gt;https://elimity.com/assessment&lt;/a&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/elimitys-identity-security"&gt;&lt;img src="http://videos.elimity.com/64968556/105467015/589b9d92fb750ad3294fcd7bbfa1ee35/standard/download-25-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=589b9d92fb750ad3294fcd7bbfa1ee35&amp;source=podcast&amp;photo%5fid=105467015" width="625" height="352" type="text/html" medium="video" duration="65" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968556/105467015/589b9d92fb750ad3294fcd7bbfa1ee35/standard/download-25-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968556/105467015/589b9d92fb750ad3294fcd7bbfa1ee35/standard/download-25-thumbnail.jpg/thumbnail.jpg"/>
            <category>product video</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968556/105467013/e68923d7741a520251776e5775862c6b/video_medium/how-to-get-mature-identity-video.mp4?source=podcast" type="video/mp4" length="1730983"/>
            <title>How to Get Mature Identity Governance with +1000 FTEs and +100's of...</title>
            <link>http://videos.elimity.com/how-to-get-mature-identity</link>
            <description>&lt;p&gt;&lt;p&gt;Watch the full webinar for an insightful session with our experts and our partner, Triple ID. In this webinar, we will explore why&amp;nbsp; user access reviews are important but often still managed manually.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ Understand why regular user access reviews are crucial for #NIS2&lt;/p&gt;
&lt;p&gt;✅ Discover the challenges of manual access review&lt;br&gt;✅ Save time, reduce errors, and become audit-ready&lt;/p&gt;
&lt;p&gt;✅ Gain expert insights from Triple ID&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128073; Secure your spot now – registration is free!&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;If you like a one-time analysis of your users and their access, you can start with Elimity’s &lt;strong&gt;Identity Security Assessment&lt;/strong&gt;! &#128640;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://elimity.com/assessment"&gt;&lt;a href="https://elimity.com/assessment"&gt;https://elimity.com/assessment&lt;/a&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/how-to-get-mature-identity"&gt;&lt;img src="http://videos.elimity.com/64968556/105467013/e68923d7741a520251776e5775862c6b/standard/download-20-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/105467013</guid>
            <pubDate>Mon, 21 Oct 2024 12:29:41 GMT</pubDate>
            <media:title>How to Get Mature Identity Governance with +1000 FTEs and +100's of...</media:title>
            <itunes:summary>Watch the full webinar for an insightful session with our experts and our partner, Triple ID. In this webinar, we will explore why user access reviews are important but often still managed manually.

✅ Understand why regular user access reviews are crucial for #NIS2
✅ Discover the challenges of manual access review✅ Save time, reduce errors, and become audit-ready
✅ Gain expert insights from Triple ID

&#128073; Secure your spot now – registration is free!

If you like a one-time analysis of your users and their access, you can start with Elimity’s Identity Security Assessment! &#128640;

https://elimity.com/assessment
</itunes:summary>
            <itunes:subtitle>Watch the full webinar for an insightful session with our experts and our partner, Triple ID. In this webinar, we will explore why user access reviews are important but often still managed manually.

✅ Understand why regular user access reviews...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>00:37</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;p&gt;Watch the full webinar for an insightful session with our experts and our partner, Triple ID. In this webinar, we will explore why&amp;nbsp; user access reviews are important but often still managed manually.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ Understand why regular user access reviews are crucial for #NIS2&lt;/p&gt;
&lt;p&gt;✅ Discover the challenges of manual access review&lt;br&gt;✅ Save time, reduce errors, and become audit-ready&lt;/p&gt;
&lt;p&gt;✅ Gain expert insights from Triple ID&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128073; Secure your spot now – registration is free!&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;If you like a one-time analysis of your users and their access, you can start with Elimity’s &lt;strong&gt;Identity Security Assessment&lt;/strong&gt;! &#128640;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://elimity.com/assessment"&gt;&lt;a href="https://elimity.com/assessment"&gt;https://elimity.com/assessment&lt;/a&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/how-to-get-mature-identity"&gt;&lt;img src="http://videos.elimity.com/64968556/105467013/e68923d7741a520251776e5775862c6b/standard/download-20-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=e68923d7741a520251776e5775862c6b&amp;source=podcast&amp;photo%5fid=105467013" width="625" height="352" type="text/html" medium="video" duration="37" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968556/105467013/e68923d7741a520251776e5775862c6b/standard/download-20-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968556/105467013/e68923d7741a520251776e5775862c6b/standard/download-20-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968556/105442679/5098fa94192ed4ca9c76f425d2a208b9/video_medium/mastering-user-access-reviews-1-video.mp4?source=podcast" type="video/mp4" length="133050107"/>
            <title>Mastering User Access Reviews</title>
            <link>http://videos.elimity.com/mastering-user-access-reviews-1</link>
            <description>&lt;p&gt;&lt;h1&gt;&lt;strong&gt;Mastering User Access Reviews&lt;/strong&gt;&lt;/h1&gt;&lt;h2&gt;How to Replace Excel and Email with Automated Access Reviews&lt;/h2&gt;&lt;p&gt;Join us for an insightful session with our experts and our partner, Triple ID. In this webinar, we will explore why&amp;nbsp; user access reviews are important but often still managed manually.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ Understand why regular user access reviews are crucial for #NIS2&lt;/p&gt;
&lt;p&gt;✅ Discover the challenges of manual access review&lt;br&gt;✅ Save time, reduce errors, and become audit-ready&lt;/p&gt;
&lt;p&gt;✅ Gain expert insights from Triple ID&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128073; Secure your spot now – registration is free!&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;If you like a one-time analysis of your users and their access, you can start with Elimity’s &lt;strong&gt;Identity Security Assessment&lt;/strong&gt;! &#128640;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://elimity.com/assessment"&gt;&lt;a href="https://elimity.com/assessment"&gt;https://elimity.com/assessment&lt;/a&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/mastering-user-access-reviews-1"&gt;&lt;img src="http://videos.elimity.com/64968556/105442679/5098fa94192ed4ca9c76f425d2a208b9/standard/download-11-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/105442679</guid>
            <pubDate>Fri, 18 Oct 2024 12:07:40 GMT</pubDate>
            <media:title>Mastering User Access Reviews</media:title>
            <itunes:summary>Mastering User Access ReviewsHow to Replace Excel and Email with Automated Access ReviewsJoin us for an insightful session with our experts and our partner, Triple ID. In this webinar, we will explore why user access reviews are important but often still managed manually.

✅ Understand why regular user access reviews are crucial for #NIS2
✅ Discover the challenges of manual access review✅ Save time, reduce errors, and become audit-ready
✅ Gain expert insights from Triple ID

&#128073; Secure your spot now – registration is free!

If you like a one-time analysis of your users and their access, you can start with Elimity’s Identity Security Assessment! &#128640;

https://elimity.com/assessment
</itunes:summary>
            <itunes:subtitle>Mastering User Access ReviewsHow to Replace Excel and Email with Automated Access ReviewsJoin us for an insightful session with our experts and our partner, Triple ID. In this webinar, we will explore why user access reviews are important but...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>47:33</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;h1&gt;&lt;strong&gt;Mastering User Access Reviews&lt;/strong&gt;&lt;/h1&gt;&lt;h2&gt;How to Replace Excel and Email with Automated Access Reviews&lt;/h2&gt;&lt;p&gt;Join us for an insightful session with our experts and our partner, Triple ID. In this webinar, we will explore why&amp;nbsp; user access reviews are important but often still managed manually.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ Understand why regular user access reviews are crucial for #NIS2&lt;/p&gt;
&lt;p&gt;✅ Discover the challenges of manual access review&lt;br&gt;✅ Save time, reduce errors, and become audit-ready&lt;/p&gt;
&lt;p&gt;✅ Gain expert insights from Triple ID&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128073; Secure your spot now – registration is free!&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;If you like a one-time analysis of your users and their access, you can start with Elimity’s &lt;strong&gt;Identity Security Assessment&lt;/strong&gt;! &#128640;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://elimity.com/assessment"&gt;&lt;a href="https://elimity.com/assessment"&gt;https://elimity.com/assessment&lt;/a&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/mastering-user-access-reviews-1"&gt;&lt;img src="http://videos.elimity.com/64968556/105442679/5098fa94192ed4ca9c76f425d2a208b9/standard/download-11-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=5098fa94192ed4ca9c76f425d2a208b9&amp;source=podcast&amp;photo%5fid=105442679" width="625" height="352" type="text/html" medium="video" duration="2853" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968556/105442679/5098fa94192ed4ca9c76f425d2a208b9/standard/download-11-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968556/105442679/5098fa94192ed4ca9c76f425d2a208b9/standard/download-11-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968569/105248675/2c3b0dce279140d34bb7af46ae4b7e42/video_medium/start-your-identity-security-video.mp4?source=podcast" type="video/mp4" length="2293139"/>
            <title>Start Your Identity Security Assessment with Elimity! </title>
            <link>http://videos.elimity.com/start-your-identity-security</link>
            <description>&lt;p&gt;&lt;h2&gt;Prove that you control your users and their access!&amp;nbsp;&lt;/h2&gt;&lt;p&gt;&lt;/p&gt;
&lt;p&gt;The NIS2-Directive requires you to prove that you are in control of your users and access. Get a one-time analysis of your users and their access within the the most crucial applications and become audit-ready!&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://elimity.com/assessment"&gt;&lt;u&gt;Start your identity security assessment today&lt;/u&gt;&lt;/a&gt;! &#128640;&lt;/p&gt;
&lt;img src="https://elimity.com/assessment" alt=""&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/start-your-identity-security"&gt;&lt;img src="http://videos.elimity.com/64968569/105248675/2c3b0dce279140d34bb7af46ae4b7e42/standard/download-23-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/105248675</guid>
            <pubDate>Thu, 10 Oct 2024 14:02:05 GMT</pubDate>
            <media:title>Start Your Identity Security Assessment with Elimity! </media:title>
            <itunes:summary>Prove that you control your users and their access!
The NIS2-Directive requires you to prove that you are in control of your users and access. Get a one-time analysis of your users and their access within the the most crucial applications and become audit-ready!

Start your identity security assessment today! &#128640;
</itunes:summary>
            <itunes:subtitle>Prove that you control your users and their access!
The NIS2-Directive requires you to prove that you are in control of your users and access. Get a one-time analysis of your users and their access within the the most crucial applications and...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>00:28</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;h2&gt;Prove that you control your users and their access!&amp;nbsp;&lt;/h2&gt;&lt;p&gt;&lt;/p&gt;
&lt;p&gt;The NIS2-Directive requires you to prove that you are in control of your users and access. Get a one-time analysis of your users and their access within the the most crucial applications and become audit-ready!&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://elimity.com/assessment"&gt;&lt;u&gt;Start your identity security assessment today&lt;/u&gt;&lt;/a&gt;! &#128640;&lt;/p&gt;
&lt;img src="https://elimity.com/assessment" alt=""&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/start-your-identity-security"&gt;&lt;img src="http://videos.elimity.com/64968569/105248675/2c3b0dce279140d34bb7af46ae4b7e42/standard/download-23-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=2c3b0dce279140d34bb7af46ae4b7e42&amp;source=podcast&amp;photo%5fid=105248675" width="625" height="352" type="text/html" medium="video" duration="28" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968569/105248675/2c3b0dce279140d34bb7af46ae4b7e42/standard/download-23-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968569/105248675/2c3b0dce279140d34bb7af46ae4b7e42/standard/download-23-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968575/102468999/aa667fda2ac2d70206361b5c0a9df86a/video_medium/nis2-sectors-v2-video.mp4?source=podcast" type="video/mp4" length="3631946"/>
            <title>NIS2: Sectors (V2)</title>
            <link>http://videos.elimity.com/nis2-sectors-v2</link>
            <description>&lt;p&gt;&lt;p&gt;NIS2 requires you to be in control of all aspects of your cybersecurity.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;With over 90% of attacks exploiting user access, controlling user access has become key to achieving #NIS2 compliance.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;&lt;/p&gt;
&lt;p&gt;✅ NIS2: Key Changes and Implications&lt;/p&gt;
&lt;p&gt;✅ NIS2 &amp;amp; IAM: Requirements Governance and Reporting&lt;/p&gt;
&lt;p&gt;✅ Case Study: Achieving NIS2 Compliance with Limited Resources&lt;/p&gt;
&lt;p&gt;✅ Solution: Lightweight Identity Governance&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/nis2-sectors-v2"&gt;&lt;img src="http://videos.elimity.com/64968575/102468999/aa667fda2ac2d70206361b5c0a9df86a/standard/download-15-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/102468999</guid>
            <pubDate>Thu, 27 Jun 2024 08:04:20 GMT</pubDate>
            <media:title>NIS2: Sectors (V2)</media:title>
            <itunes:summary>NIS2 requires you to be in control of all aspects of your cybersecurity.

With over 90% of attacks exploiting user access, controlling user access has become key to achieving #NIS2 compliance.

✅ NIS2: Key Changes and Implications
✅ NIS2  IAM: Requirements Governance and Reporting
✅ Case Study: Achieving NIS2 Compliance with Limited Resources
✅ Solution: Lightweight Identity Governance
</itunes:summary>
            <itunes:subtitle>NIS2 requires you to be in control of all aspects of your cybersecurity.

With over 90% of attacks exploiting user access, controlling user access has become key to achieving #NIS2 compliance.

✅ NIS2: Key Changes and Implications
✅ NIS2  IAM:...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:21</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;p&gt;NIS2 requires you to be in control of all aspects of your cybersecurity.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;With over 90% of attacks exploiting user access, controlling user access has become key to achieving #NIS2 compliance.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;&lt;/p&gt;
&lt;p&gt;✅ NIS2: Key Changes and Implications&lt;/p&gt;
&lt;p&gt;✅ NIS2 &amp;amp; IAM: Requirements Governance and Reporting&lt;/p&gt;
&lt;p&gt;✅ Case Study: Achieving NIS2 Compliance with Limited Resources&lt;/p&gt;
&lt;p&gt;✅ Solution: Lightweight Identity Governance&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/nis2-sectors-v2"&gt;&lt;img src="http://videos.elimity.com/64968575/102468999/aa667fda2ac2d70206361b5c0a9df86a/standard/download-15-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=aa667fda2ac2d70206361b5c0a9df86a&amp;source=podcast&amp;photo%5fid=102468999" width="625" height="352" type="text/html" medium="video" duration="81" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968575/102468999/aa667fda2ac2d70206361b5c0a9df86a/standard/download-15-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968575/102468999/aa667fda2ac2d70206361b5c0a9df86a/standard/download-15-thumbnail.jpg/thumbnail.jpg"/>
            <category>IAM</category>
            <category>NIS2</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968560/102468516/c7a11831db31e2ee065f1a6b53325e4b/video_medium/nis2-session-what-to-expect-video.mp4?source=podcast" type="video/mp4" length="2206943"/>
            <title>NIS2-Session: What to Expect</title>
            <link>http://videos.elimity.com/nis2-session-what-to-expect</link>
            <description>&lt;p&gt;&lt;p&gt;NIS2 requires you to be in control of all aspects of your cybersecurity.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;With over 90% of attacks exploiting user access, controlling user access has become key to achieving #NIS2 compliance.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;On June 26th at 4:00 PM CET, the experts of Inetum-Realdolmen, European leader in digital services and Elimity will host a session to cover:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ NIS2: Key Changes and Implications&lt;/p&gt;
&lt;p&gt;✅ NIS2 &amp;amp; IAM: Requirements Governance and Reporting&lt;/p&gt;
&lt;p&gt;✅ Case Study: Achieving NIS2 Compliance with Limited Resources&lt;/p&gt;
&lt;p&gt;✅ Solution: Lightweight Identity Governance&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/nis2-session-what-to-expect"&gt;&lt;img src="http://videos.elimity.com/64968560/102468516/c7a11831db31e2ee065f1a6b53325e4b/standard/download-13-thumbnail.jpg" width="75" height="75"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/102468516</guid>
            <pubDate>Thu, 27 Jun 2024 07:37:53 GMT</pubDate>
            <media:title>NIS2-Session: What to Expect</media:title>
            <itunes:summary>NIS2 requires you to be in control of all aspects of your cybersecurity.

With over 90% of attacks exploiting user access, controlling user access has become key to achieving #NIS2 compliance.

On June 26th at 4:00 PM CET, the experts of Inetum-Realdolmen, European leader in digital services and Elimity will host a session to cover:

✅ NIS2: Key Changes and Implications
✅ NIS2  IAM: Requirements Governance and Reporting
✅ Case Study: Achieving NIS2 Compliance with Limited Resources
✅ Solution: Lightweight Identity Governance

</itunes:summary>
            <itunes:subtitle>NIS2 requires you to be in control of all aspects of your cybersecurity.

With over 90% of attacks exploiting user access, controlling user access has become key to achieving #NIS2 compliance.

On June 26th at 4:00 PM CET, the experts of...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>00:48</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;p&gt;NIS2 requires you to be in control of all aspects of your cybersecurity.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;With over 90% of attacks exploiting user access, controlling user access has become key to achieving #NIS2 compliance.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;On June 26th at 4:00 PM CET, the experts of Inetum-Realdolmen, European leader in digital services and Elimity will host a session to cover:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ NIS2: Key Changes and Implications&lt;/p&gt;
&lt;p&gt;✅ NIS2 &amp;amp; IAM: Requirements Governance and Reporting&lt;/p&gt;
&lt;p&gt;✅ Case Study: Achieving NIS2 Compliance with Limited Resources&lt;/p&gt;
&lt;p&gt;✅ Solution: Lightweight Identity Governance&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/nis2-session-what-to-expect"&gt;&lt;img src="http://videos.elimity.com/64968560/102468516/c7a11831db31e2ee065f1a6b53325e4b/standard/download-13-thumbnail.jpg" width="75" height="75"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=c7a11831db31e2ee065f1a6b53325e4b&amp;source=podcast&amp;photo%5fid=102468516" width="625" height="352" type="text/html" medium="video" duration="48" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968560/102468516/c7a11831db31e2ee065f1a6b53325e4b/standard/download-13-thumbnail.jpg" width="75" height="75"/>
            <itunes:image href="http://videos.elimity.com/64968560/102468516/c7a11831db31e2ee065f1a6b53325e4b/standard/download-13-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968578/102457174/eff60474213ac4ddae015ebc5481b919/video_medium/nis2-and-iam-5-tips-to-take-3-video.mp4?source=podcast" type="video/mp4" length="118093204"/>
            <title>NIS2 and IAM:  5 Tips to Take Control of User Access Within Days</title>
            <link>http://videos.elimity.com/nis2-and-iam-5-tips-to-take-3</link>
            <description>&lt;p&gt;&lt;p&gt;NIS2 requires you to be in control of all aspects of your cybersecurity.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;With over 90% of attacks exploiting user access, controlling user access has become key to achieving #NIS2 compliance.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;On June 26th at 4:00 PM CET, the experts of Inetum-Realdolmen, European leader in digital services and Elimity will host a session to cover:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ NIS2: Key Changes and Implications&lt;/p&gt;
&lt;p&gt;✅ NIS2 &amp;amp; IAM: Requirements Governance and Reporting&lt;/p&gt;
&lt;p&gt;✅ Case Study: Achieving NIS2 Compliance with Limited Resources&lt;/p&gt;
&lt;p&gt;✅ Solution: Lightweight Identity Governance&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/nis2-and-iam-5-tips-to-take-3"&gt;&lt;img src="http://videos.elimity.com/64968578/102457174/eff60474213ac4ddae015ebc5481b919/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/102457174</guid>
            <pubDate>Thu, 27 Jun 2024 06:49:09 GMT</pubDate>
            <media:title>NIS2 and IAM:  5 Tips to Take Control of User Access Within Days</media:title>
            <itunes:summary>NIS2 requires you to be in control of all aspects of your cybersecurity.

With over 90% of attacks exploiting user access, controlling user access has become key to achieving #NIS2 compliance.

On June 26th at 4:00 PM CET, the experts of Inetum-Realdolmen, European leader in digital services and Elimity will host a session to cover:

✅ NIS2: Key Changes and Implications
✅ NIS2  IAM: Requirements Governance and Reporting
✅ Case Study: Achieving NIS2 Compliance with Limited Resources
✅ Solution: Lightweight Identity Governance

</itunes:summary>
            <itunes:subtitle>NIS2 requires you to be in control of all aspects of your cybersecurity.

With over 90% of attacks exploiting user access, controlling user access has become key to achieving #NIS2 compliance.

On June 26th at 4:00 PM CET, the experts of...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>41:15</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;p&gt;NIS2 requires you to be in control of all aspects of your cybersecurity.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;With over 90% of attacks exploiting user access, controlling user access has become key to achieving #NIS2 compliance.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;On June 26th at 4:00 PM CET, the experts of Inetum-Realdolmen, European leader in digital services and Elimity will host a session to cover:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ NIS2: Key Changes and Implications&lt;/p&gt;
&lt;p&gt;✅ NIS2 &amp;amp; IAM: Requirements Governance and Reporting&lt;/p&gt;
&lt;p&gt;✅ Case Study: Achieving NIS2 Compliance with Limited Resources&lt;/p&gt;
&lt;p&gt;✅ Solution: Lightweight Identity Governance&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/nis2-and-iam-5-tips-to-take-3"&gt;&lt;img src="http://videos.elimity.com/64968578/102457174/eff60474213ac4ddae015ebc5481b919/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=eff60474213ac4ddae015ebc5481b919&amp;source=podcast&amp;photo%5fid=102457174" width="625" height="352" type="text/html" medium="video" duration="2475" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968578/102457174/eff60474213ac4ddae015ebc5481b919/standard/download-9-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968578/102457174/eff60474213ac4ddae015ebc5481b919/standard/download-9-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968561/105693060/4813a36022313ac1c28ef5488927aa9a/video_medium/product-demo-the-lightweight-video.mp4?source=podcast" type="video/mp4" length="53787221"/>
            <title>[Product Demo] The Lightweight Identity Governance Platform &#128640;</title>
            <link>http://videos.elimity.com/product-demo-the-lightweight</link>
            <description>&lt;p&gt;&lt;h1&gt;The Product Demo&lt;/h1&gt;&lt;h2&gt;"Who can access what within my organisation?"&lt;/h2&gt;&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Having provable control over who can access is crucial for the NIS2 and ISO 27001 certifications.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Elimity Insights is the lightweight identity governance solution that allows security teams to take control of user access within days.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Elimity Insights allows security to easily answer the ever-growing number of IAM data questions: easily understand who can currently access what, identify risks, act upon these and prove that you've taken action afterwards! ✅&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/product-demo-the-lightweight"&gt;&lt;img src="http://videos.elimity.com/64968561/105693060/4813a36022313ac1c28ef5488927aa9a/standard/download-12-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/105693060</guid>
            <pubDate>Thu, 27 Jun 2024 06:49:09 GMT</pubDate>
            <media:title>[Product Demo] The Lightweight Identity Governance Platform &#128640;</media:title>
            <itunes:summary>The Product Demo"Who can access what within my organisation?"
Having provable control over who can access is crucial for the NIS2 and ISO 27001 certifications.

Elimity Insights is the lightweight identity governance solution that allows security teams to take control of user access within days.

Elimity Insights allows security to easily answer the ever-growing number of IAM data questions: easily understand who can currently access what, identify risks, act upon these and prove that you've taken action afterwards! ✅
</itunes:summary>
            <itunes:subtitle>The Product Demo"Who can access what within my organisation?"
Having provable control over who can access is crucial for the NIS2 and ISO 27001 certifications.

Elimity Insights is the lightweight identity governance solution that allows security...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>17:58</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;h1&gt;The Product Demo&lt;/h1&gt;&lt;h2&gt;"Who can access what within my organisation?"&lt;/h2&gt;&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Having provable control over who can access is crucial for the NIS2 and ISO 27001 certifications.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Elimity Insights is the lightweight identity governance solution that allows security teams to take control of user access within days.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Elimity Insights allows security to easily answer the ever-growing number of IAM data questions: easily understand who can currently access what, identify risks, act upon these and prove that you've taken action afterwards! ✅&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/product-demo-the-lightweight"&gt;&lt;img src="http://videos.elimity.com/64968561/105693060/4813a36022313ac1c28ef5488927aa9a/standard/download-12-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=4813a36022313ac1c28ef5488927aa9a&amp;source=podcast&amp;photo%5fid=105693060" width="625" height="352" type="text/html" medium="video" duration="1078" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968561/105693060/4813a36022313ac1c28ef5488927aa9a/standard/download-12-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968561/105693060/4813a36022313ac1c28ef5488927aa9a/standard/download-12-thumbnail.jpg/thumbnail.jpg"/>
            <category>Product Demo</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968579/102644829/5019727cca39dbd659e78b43226c12b9/video_medium/product-demo-peer-review-with-video.mp4?source=podcast" type="video/mp4" length="6402241"/>
            <title>[Product Demo] Peer Review with Elimity Insights</title>
            <link>http://videos.elimity.com/product-demo-peer-review-with</link>
            <description>&lt;p&gt;Elimity Insights lets you easily understand who can currently access what, identify risks, act upon these and prove that you've taken action afterwards. Watch now the 10-minute product video! &#128071;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/product-demo-peer-review-with"&gt;&lt;img src="http://videos.elimity.com/64968579/102644829/5019727cca39dbd659e78b43226c12b9/standard/download-14-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/102644829</guid>
            <pubDate>Thu, 27 Jun 2024 06:49:09 GMT</pubDate>
            <media:title>[Product Demo] Peer Review with Elimity Insights</media:title>
            <itunes:summary>Elimity Insights lets you easily understand who can currently access what, identify risks, act upon these and prove that you've taken action afterwards. Watch now the 10-minute product video! &#128071;</itunes:summary>
            <itunes:subtitle>Elimity Insights lets you easily understand who can currently access what, identify risks, act upon these and prove that you've taken action afterwards. Watch now the 10-minute product video! &#128071;</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:55</itunes:duration>
            <media:description type="html">&lt;p&gt;Elimity Insights lets you easily understand who can currently access what, identify risks, act upon these and prove that you've taken action afterwards. Watch now the 10-minute product video! &#128071;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/product-demo-peer-review-with"&gt;&lt;img src="http://videos.elimity.com/64968579/102644829/5019727cca39dbd659e78b43226c12b9/standard/download-14-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=5019727cca39dbd659e78b43226c12b9&amp;source=podcast&amp;photo%5fid=102644829" width="625" height="351" type="text/html" medium="video" duration="115" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968579/102644829/5019727cca39dbd659e78b43226c12b9/standard/download-14-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968579/102644829/5019727cca39dbd659e78b43226c12b9/standard/download-14-thumbnail.jpg/thumbnail.jpg"/>
            <category>nis2</category>
            <category>product demo</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968569/102644192/33fc4a686141c38c206848754d1546bc/video_medium/product-demo-how-elimity-simplifies-video.mp4?source=podcast" type="video/mp4" length="33136669"/>
            <title>[Product Demo] How Elimity Simplifies Identity Governance for NIS2 Compliance </title>
            <link>http://videos.elimity.com/product-demo-how-elimity-simplifies</link>
            <description>&lt;p&gt;Elimity Insights lets you easily understand who can currently access what, identify risks, act upon these and prove that you've taken action afterwards. Watch now the 10-minute product video! &#128071;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/product-demo-how-elimity-simplifies"&gt;&lt;img src="http://videos.elimity.com/64968569/102644192/33fc4a686141c38c206848754d1546bc/standard/download-11-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/102644192</guid>
            <pubDate>Thu, 27 Jun 2024 06:49:09 GMT</pubDate>
            <media:title>[Product Demo] How Elimity Simplifies Identity Governance for NIS2 Compliance </media:title>
            <itunes:summary>Elimity Insights lets you easily understand who can currently access what, identify risks, act upon these and prove that you've taken action afterwards. Watch now the 10-minute product video! &#128071;</itunes:summary>
            <itunes:subtitle>Elimity Insights lets you easily understand who can currently access what, identify risks, act upon these and prove that you've taken action afterwards. Watch now the 10-minute product video! &#128071;</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>11:05</itunes:duration>
            <media:description type="html">&lt;p&gt;Elimity Insights lets you easily understand who can currently access what, identify risks, act upon these and prove that you've taken action afterwards. Watch now the 10-minute product video! &#128071;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/product-demo-how-elimity-simplifies"&gt;&lt;img src="http://videos.elimity.com/64968569/102644192/33fc4a686141c38c206848754d1546bc/standard/download-11-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=33fc4a686141c38c206848754d1546bc&amp;source=podcast&amp;photo%5fid=102644192" width="625" height="352" type="text/html" medium="video" duration="665" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968569/102644192/33fc4a686141c38c206848754d1546bc/standard/download-11-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968569/102644192/33fc4a686141c38c206848754d1546bc/standard/download-11-thumbnail.jpg/thumbnail.jpg"/>
            <category>NIS2</category>
            <category>Product Demo</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968580/102086704/43b93922907379ddbf3f78fd2d105c4d/video_medium/data-driven-decision-making-in-iam-1-video.mp4?source=podcast" type="video/mp4" length="128536969"/>
            <title>Data-Driven Decision Making in IAM &#128202;</title>
            <link>http://videos.elimity.com/data-driven-decision-making-in-iam-1</link>
            <description>&lt;p&gt;&lt;p&gt;Identity and access management (IAM) presents a complex challenge in the digital era. IAM teams at large organizations struggle to answer the ever-growing IAM data questions.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The Challenges?&lt;br&gt;&lt;/strong&gt;&lt;br&gt;❌ Failed audit findings around identity visibility&lt;/p&gt;
&lt;p&gt;❌ Overwhelming number of IAM data questions from many different stakeholders (Audit, Security, Business, ...);&lt;/p&gt;
&lt;p&gt;❌ The IGA itself provides basic and limited reporting, leading to manual work;&lt;/p&gt;
&lt;p&gt;❌ Many systems are still not connected to IGA, as this is to costly&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What To Expect?&lt;br&gt;&lt;br&gt;&lt;/strong&gt;✅ Identity Chaos: The main identity challenges&lt;/p&gt;
&lt;p&gt;✅ Data-Driven Decision Making within IAM&lt;/p&gt;
&lt;p&gt;✅ Case study: Fortune 500 financial industry leader's analytics journey&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt; Your Hosts?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This webinar is hosted by Indigo Consulting - IAM experts renowned for its IAM expertise, alongside Elimity, the identity data analytics company.&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/data-driven-decision-making-in-iam-1"&gt;&lt;img src="http://videos.elimity.com/64968580/102086704/43b93922907379ddbf3f78fd2d105c4d/standard/download-7-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/102086704</guid>
            <pubDate>Mon, 17 Jun 2024 09:23:54 GMT</pubDate>
            <media:title>Data-Driven Decision Making in IAM &#128202;</media:title>
            <itunes:summary>Identity and access management (IAM) presents a complex challenge in the digital era. IAM teams at large organizations struggle to answer the ever-growing IAM data questions.

The Challenges?❌ Failed audit findings around identity visibility
❌ Overwhelming number of IAM data questions from many different stakeholders (Audit, Security, Business, ...);
❌ The IGA itself provides basic and limited reporting, leading to manual work;
❌ Many systems are still not connected to IGA, as this is to costly

What To Expect?✅ Identity Chaos: The main identity challenges
✅ Data-Driven Decision Making within IAM
✅ Case study: Fortune 500 financial industry leader's analytics journey

 Your Hosts?
This webinar is hosted by Indigo Consulting - IAM experts renowned for its IAM expertise, alongside Elimity, the identity data analytics company.
</itunes:summary>
            <itunes:subtitle>Identity and access management (IAM) presents a complex challenge in the digital era. IAM teams at large organizations struggle to answer the ever-growing IAM data questions.

The Challenges?❌ Failed audit findings around identity visibility
❌...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>53:36</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;p&gt;Identity and access management (IAM) presents a complex challenge in the digital era. IAM teams at large organizations struggle to answer the ever-growing IAM data questions.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The Challenges?&lt;br&gt;&lt;/strong&gt;&lt;br&gt;❌ Failed audit findings around identity visibility&lt;/p&gt;
&lt;p&gt;❌ Overwhelming number of IAM data questions from many different stakeholders (Audit, Security, Business, ...);&lt;/p&gt;
&lt;p&gt;❌ The IGA itself provides basic and limited reporting, leading to manual work;&lt;/p&gt;
&lt;p&gt;❌ Many systems are still not connected to IGA, as this is to costly&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What To Expect?&lt;br&gt;&lt;br&gt;&lt;/strong&gt;✅ Identity Chaos: The main identity challenges&lt;/p&gt;
&lt;p&gt;✅ Data-Driven Decision Making within IAM&lt;/p&gt;
&lt;p&gt;✅ Case study: Fortune 500 financial industry leader's analytics journey&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt; Your Hosts?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This webinar is hosted by Indigo Consulting - IAM experts renowned for its IAM expertise, alongside Elimity, the identity data analytics company.&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/data-driven-decision-making-in-iam-1"&gt;&lt;img src="http://videos.elimity.com/64968580/102086704/43b93922907379ddbf3f78fd2d105c4d/standard/download-7-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=43b93922907379ddbf3f78fd2d105c4d&amp;source=podcast&amp;photo%5fid=102086704" width="625" height="352" type="text/html" medium="video" duration="3216" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968580/102086704/43b93922907379ddbf3f78fd2d105c4d/standard/download-7-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968580/102086704/43b93922907379ddbf3f78fd2d105c4d/standard/download-7-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968568/102142574/07e9f6f9460c51f7cf52de274ac71900/video_medium/idata-driven-iam-the-3-main-video.mp4?source=podcast" type="video/mp4" length="4751527"/>
            <title>[IData-Driven IAM ] The 3 Main Challenges</title>
            <link>http://videos.elimity.com/idata-driven-iam-the-3-main</link>
            <description>&lt;p&gt;Identity and access management (IAM) presents a complex challenge in the digital era.&lt;/p&gt;
&lt;p&gt;Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.&lt;/p&gt;
&lt;p&gt;At Elimity and Indigo Consulting, we see a number of recurring challenges:&lt;/p&gt;
&lt;p&gt;1️⃣ Identity sprawl: there is an exponential growth of identities and access rights in many organization due to cloud, IT and other technologies.&lt;/p&gt;
&lt;p&gt;2️⃣ Siloed information: these identities are spread across many individual environments,&lt;br /&gt;
resulting into escalating costs.&lt;/p&gt;
&lt;p&gt;3️⃣ Resource scarcity: all while IAM resources and expertise are becoming more scarce.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/idata-driven-iam-the-3-main"&gt;&lt;img src="http://videos.elimity.com/64968568/102142574/07e9f6f9460c51f7cf52de274ac71900/standard/download-14-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/102142574</guid>
            <pubDate>Mon, 17 Jun 2024 09:23:54 GMT</pubDate>
            <media:title>[IData-Driven IAM ] The 3 Main Challenges</media:title>
            <itunes:summary>Identity and access management (IAM) presents a complex challenge in the digital era.
Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.
At Elimity and Indigo Consulting, we see a number of recurring challenges:
1️⃣ Identity sprawl: there is an exponential growth of identities and access rights in many organization due to cloud, IT and other technologies.
2️⃣ Siloed information: these identities are spread across many individual environments,
resulting into escalating costs.
3️⃣ Resource scarcity: all while IAM resources and expertise are becoming more scarce.</itunes:summary>
            <itunes:subtitle>Identity and access management (IAM) presents a complex challenge in the digital era.
Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2,...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:48</itunes:duration>
            <media:description type="html">&lt;p&gt;Identity and access management (IAM) presents a complex challenge in the digital era.&lt;/p&gt;
&lt;p&gt;Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.&lt;/p&gt;
&lt;p&gt;At Elimity and Indigo Consulting, we see a number of recurring challenges:&lt;/p&gt;
&lt;p&gt;1️⃣ Identity sprawl: there is an exponential growth of identities and access rights in many organization due to cloud, IT and other technologies.&lt;/p&gt;
&lt;p&gt;2️⃣ Siloed information: these identities are spread across many individual environments,&lt;br /&gt;
resulting into escalating costs.&lt;/p&gt;
&lt;p&gt;3️⃣ Resource scarcity: all while IAM resources and expertise are becoming more scarce.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/idata-driven-iam-the-3-main"&gt;&lt;img src="http://videos.elimity.com/64968568/102142574/07e9f6f9460c51f7cf52de274ac71900/standard/download-14-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=07e9f6f9460c51f7cf52de274ac71900&amp;source=podcast&amp;photo%5fid=102142574" width="625" height="352" type="text/html" medium="video" duration="108" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968568/102142574/07e9f6f9460c51f7cf52de274ac71900/standard/download-14-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968568/102142574/07e9f6f9460c51f7cf52de274ac71900/standard/download-14-thumbnail.jpg/thumbnail.jpg"/>
            <category>Data-Driven IAM</category>
            <category>IAM</category>
            <category>Identity Analytics</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968568/102142572/1f52db3930a592edce2689be8c554683/video_medium/idata-driven-iam-identity-video.mp4?source=podcast" type="video/mp4" length="2975062"/>
            <title>[IData-Driven IAM ] Identity Analytics on Top of your IGA</title>
            <link>http://videos.elimity.com/idata-driven-iam-identity</link>
            <description>&lt;p&gt;At Indigo Consulting and Elimity, we see identity data challenges at companies with very large IAM teams and mature IGA deployments.&lt;/p&gt;
&lt;p&gt;In that case, even though they already have an IGA solution that manages the user lifecycle - JML -  for many applications, the teams still lack the identity visibility.&lt;/p&gt;
&lt;p&gt;And when we say teams, for these large organizations it means Auditors, Security teams, Business IT, Application owners, and so on. As a result of that, lots of time is still wasted on generating and waiting for IAM reports - and lot’s of critical data gaps are never accounted for.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/idata-driven-iam-identity"&gt;&lt;img src="http://videos.elimity.com/64968568/102142572/1f52db3930a592edce2689be8c554683/standard/download-14-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/102142572</guid>
            <pubDate>Mon, 17 Jun 2024 09:23:54 GMT</pubDate>
            <media:title>[IData-Driven IAM ] Identity Analytics on Top of your IGA</media:title>
            <itunes:summary>At Indigo Consulting and Elimity, we see identity data challenges at companies with very large IAM teams and mature IGA deployments.
In that case, even though they already have an IGA solution that manages the user lifecycle - JML -  for many applications, the teams still lack the identity visibility.
And when we say teams, for these large organizations it means Auditors, Security teams, Business IT, Application owners, and so on. As a result of that, lots of time is still wasted on generating and waiting for IAM reports - and lot’s of critical data gaps are never accounted for.</itunes:summary>
            <itunes:subtitle>At Indigo Consulting and Elimity, we see identity data challenges at companies with very large IAM teams and mature IGA deployments.
In that case, even though they already have an IGA solution that manages the user lifecycle - JML -  for many...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:24</itunes:duration>
            <media:description type="html">&lt;p&gt;At Indigo Consulting and Elimity, we see identity data challenges at companies with very large IAM teams and mature IGA deployments.&lt;/p&gt;
&lt;p&gt;In that case, even though they already have an IGA solution that manages the user lifecycle - JML -  for many applications, the teams still lack the identity visibility.&lt;/p&gt;
&lt;p&gt;And when we say teams, for these large organizations it means Auditors, Security teams, Business IT, Application owners, and so on. As a result of that, lots of time is still wasted on generating and waiting for IAM reports - and lot’s of critical data gaps are never accounted for.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/idata-driven-iam-identity"&gt;&lt;img src="http://videos.elimity.com/64968568/102142572/1f52db3930a592edce2689be8c554683/standard/download-14-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=1f52db3930a592edce2689be8c554683&amp;source=podcast&amp;photo%5fid=102142572" width="625" height="352" type="text/html" medium="video" duration="84" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968568/102142572/1f52db3930a592edce2689be8c554683/standard/download-14-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968568/102142572/1f52db3930a592edce2689be8c554683/standard/download-14-thumbnail.jpg/thumbnail.jpg"/>
            <category> CMMC etc.   However</category>
            <category>Data-Driven IAM</category>
            <category> especially with regulations such as NIS2</category>
            <category>IAM</category>
            <category>Identity Analytics</category>
            <category>IGA</category>
            <category> in practice we see a number of recurring challenges: identity sprawl: there is an exponential growth of identities and access rights in many organization due to cloud</category>
            <category> ISO27001</category>
            <category> IT and other technologies</category>
            <category> resulting into escalating costs  Resource scarcity: all while IAM resources and expertise are becoming more scarce.</category>
            <category> siloed information: these identities are spread across many individual environments</category>
            <category> SOC2</category>
            <category>The reason that we chose this topic is that securing access to data and applications has become a cornerstone of any modern cybersecurity strategy</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968568/102142570/7a2664fd113d59b21679b2dfd3d687b9/video_medium/data-driven-iam-merger-and-video.mp4?source=podcast" type="video/mp4" length="1816417"/>
            <title>[Data-Driven IAM] Merger and Acquisition</title>
            <link>http://videos.elimity.com/data-driven-iam-merger-and</link>
            <description>&lt;p&gt;Identity and access management (IAM) presents a complex challenge in the digital era.&lt;/p&gt;
&lt;p&gt;Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.&lt;/p&gt;
&lt;p&gt;At Indigo Consulting and Elimity, we see that merging companies struggle to have a streamlined identity and access management process.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/data-driven-iam-merger-and"&gt;&lt;img src="http://videos.elimity.com/64968568/102142570/7a2664fd113d59b21679b2dfd3d687b9/standard/download-13-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/102142570</guid>
            <pubDate>Mon, 17 Jun 2024 09:23:54 GMT</pubDate>
            <media:title>[Data-Driven IAM] Merger and Acquisition</media:title>
            <itunes:summary>Identity and access management (IAM) presents a complex challenge in the digital era.
Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.
At Indigo Consulting and Elimity, we see that merging companies struggle to have a streamlined identity and access management process.</itunes:summary>
            <itunes:subtitle>Identity and access management (IAM) presents a complex challenge in the digital era.
Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2,...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>00:51</itunes:duration>
            <media:description type="html">&lt;p&gt;Identity and access management (IAM) presents a complex challenge in the digital era.&lt;/p&gt;
&lt;p&gt;Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.&lt;/p&gt;
&lt;p&gt;At Indigo Consulting and Elimity, we see that merging companies struggle to have a streamlined identity and access management process.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/data-driven-iam-merger-and"&gt;&lt;img src="http://videos.elimity.com/64968568/102142570/7a2664fd113d59b21679b2dfd3d687b9/standard/download-13-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=7a2664fd113d59b21679b2dfd3d687b9&amp;source=podcast&amp;photo%5fid=102142570" width="625" height="352" type="text/html" medium="video" duration="51" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968568/102142570/7a2664fd113d59b21679b2dfd3d687b9/standard/download-13-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968568/102142570/7a2664fd113d59b21679b2dfd3d687b9/standard/download-13-thumbnail.jpg/thumbnail.jpg"/>
            <category>Data-Driven IAM</category>
            <category>IAM</category>
            <category>Identity Analytics</category>
            <category>IGA</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968568/102142567/d92c0f224b4afb06bffe976a9067f55d/video_medium/data-driven-iam-start-your-iga-video.mp4?source=podcast" type="video/mp4" length="5337257"/>
            <title>[Data-Driven IAM] Start Your IGA Journey</title>
            <link>http://videos.elimity.com/data-driven-iam-start-your-iga</link>
            <description>&lt;p&gt;Identity and access management (IAM) presents a complex challenge in the digital era.&lt;/p&gt;
&lt;p&gt;Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.&lt;/p&gt;
&lt;p&gt;For companies at the start of their IGA journey, this data-driven, risk-driven approach has the potential to let them achieve mature access governance in a matter of days, not months.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/data-driven-iam-start-your-iga"&gt;&lt;img src="http://videos.elimity.com/64968568/102142567/d92c0f224b4afb06bffe976a9067f55d/standard/download-12-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/102142567</guid>
            <pubDate>Mon, 17 Jun 2024 09:23:54 GMT</pubDate>
            <media:title>[Data-Driven IAM] Start Your IGA Journey</media:title>
            <itunes:summary>Identity and access management (IAM) presents a complex challenge in the digital era.
Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.
For companies at the start of their IGA journey, this data-driven, risk-driven approach has the potential to let them achieve mature access governance in a matter of days, not months.</itunes:summary>
            <itunes:subtitle>Identity and access management (IAM) presents a complex challenge in the digital era.
Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2,...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>02:32</itunes:duration>
            <media:description type="html">&lt;p&gt;Identity and access management (IAM) presents a complex challenge in the digital era.&lt;/p&gt;
&lt;p&gt;Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.&lt;/p&gt;
&lt;p&gt;For companies at the start of their IGA journey, this data-driven, risk-driven approach has the potential to let them achieve mature access governance in a matter of days, not months.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/data-driven-iam-start-your-iga"&gt;&lt;img src="http://videos.elimity.com/64968568/102142567/d92c0f224b4afb06bffe976a9067f55d/standard/download-12-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=d92c0f224b4afb06bffe976a9067f55d&amp;source=podcast&amp;photo%5fid=102142567" width="625" height="352" type="text/html" medium="video" duration="152" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968568/102142567/d92c0f224b4afb06bffe976a9067f55d/standard/download-12-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968568/102142567/d92c0f224b4afb06bffe976a9067f55d/standard/download-12-thumbnail.jpg/thumbnail.jpg"/>
            <category>Data-Driven IAM</category>
            <category>IAM</category>
            <category>Identity Analytics</category>
            <category>Lightweight Identity Governance</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968577/96224559/56160f296f240478cd12ab77be35819f/video_medium/iam-data-questions-every-iam-team-video.mp4?source=podcast" type="video/mp4" length="68259378"/>
            <title>IAM Data Questions Every IAM Team Struggles With &#129300;</title>
            <link>http://videos.elimity.com/iam-data-questions-every-iam-team</link>
            <description>&lt;p&gt;Do various stakeholders within your organisation require IAM insights?&lt;/p&gt;
&lt;p&gt;In this extended demo, Eli Nazarov - VP of Sales Elimity - hows how integrated identity analytics can help you answer these questions! &lt;br /&gt;
&lt;br /&gt;
For more information, contact our identity experts on shttps://elimity.com/en/start-now.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/iam-data-questions-every-iam-team"&gt;&lt;img src="http://videos.elimity.com/64968577/96224559/56160f296f240478cd12ab77be35819f/standard/download-12-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/96224559</guid>
            <pubDate>Thu, 28 Mar 2024 17:03:29 GMT</pubDate>
            <media:title>IAM Data Questions Every IAM Team Struggles With &#129300;</media:title>
            <itunes:summary>Do various stakeholders within your organisation require IAM insights?
In this extended demo, Eli Nazarov - VP of Sales Elimity - hows how integrated identity analytics can help you answer these questions! 

For more information, contact our identity experts on shttps://elimity.com/en/start-now.</itunes:summary>
            <itunes:subtitle>Do various stakeholders within your organisation require IAM insights?
In this extended demo, Eli Nazarov - VP of Sales Elimity - hows how integrated identity analytics can help you answer these questions! 

For more information, contact our...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>25:27</itunes:duration>
            <media:description type="html">&lt;p&gt;Do various stakeholders within your organisation require IAM insights?&lt;/p&gt;
&lt;p&gt;In this extended demo, Eli Nazarov - VP of Sales Elimity - hows how integrated identity analytics can help you answer these questions! &lt;br /&gt;
&lt;br /&gt;
For more information, contact our identity experts on shttps://elimity.com/en/start-now.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/iam-data-questions-every-iam-team"&gt;&lt;img src="http://videos.elimity.com/64968577/96224559/56160f296f240478cd12ab77be35819f/standard/download-12-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=56160f296f240478cd12ab77be35819f&amp;source=podcast&amp;photo%5fid=96224559" width="625" height="352" type="text/html" medium="video" duration="1527" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968577/96224559/56160f296f240478cd12ab77be35819f/standard/download-12-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968577/96224559/56160f296f240478cd12ab77be35819f/standard/download-12-thumbnail.jpg/thumbnail.jpg"/>
            <category>IAM Questions</category>
            <category>identity data analytics</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968558/95967348/61ff2209a33640a8dfa2d823aecd9ff4/video_medium/identity-data-from-chaos-to-3-video.mp4?source=podcast" type="video/mp4" length="144108917"/>
            <title>Identity Data: From Chaos to Visibility</title>
            <link>http://videos.elimity.com/identity-data-from-chaos-to-3</link>
            <description>&lt;p&gt;&lt;p&gt;Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy.&lt;/p&gt;
&lt;p&gt;User access governance projects however have a history of incurring multi-year roll-outs and requiring specialized personnel, making many companies shy away and bear excessive cyber risk.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;What to Expect?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;✅ Why Do Organizations Need Identity Visibility?&lt;/p&gt;
&lt;p&gt;&amp;nbsp;✅  5 Tips to Achieve This Within Days&lt;/p&gt;
&lt;p&gt;&amp;nbsp;✅  Customer Story of Financial Institution&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;Your Hosts?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This webinar is hosted by Approach Cyber, a dedicated cybersecurity and privacy service provider, alongside Elimity, who developed the lightweight identity governance platform.&lt;/p&gt;
&lt;p&gt;Both organizations encounter security leaders who are striving to manage user access but face various challenges.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Therefore, they will provide you with expert insights and best practices within the field of identity governance.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;Interesting Reads&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&#128073;&lt;a href="https://elimity.com/resources/customer-case-take-control-within-days" target="_self"&gt;  Insurance Company Took Control of User Access Within 3 Da&lt;/a&gt;ys&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&#128073; &lt;a href="https://elimity.com/resources/customer-case-take-control-within-days" target="_self"&gt; How To Prove That You Are In Contr&lt;/a&gt;ol&amp;nbsp;&lt;/p&gt;
&lt;p&gt;For more information, visit Approach at www.approach-cyber.com and Elimity at www.elimity.com.&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/identity-data-from-chaos-to-3"&gt;&lt;img src="http://videos.elimity.com/64968558/95967348/61ff2209a33640a8dfa2d823aecd9ff4/standard/download-6-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/95967348</guid>
            <pubDate>Mon, 25 Mar 2024 19:50:56 GMT</pubDate>
            <media:title>Identity Data: From Chaos to Visibility</media:title>
            <itunes:summary>Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy.
User access governance projects however have a history of incurring multi-year roll-outs and requiring specialized personnel, making many companies shy away and bear excessive cyber risk.
What to Expect?
✅ Why Do Organizations Need Identity Visibility?
✅  5 Tips to Achieve This Within Days
✅  Customer Story of Financial Institution

Your Hosts?
This webinar is hosted by Approach Cyber, a dedicated cybersecurity and privacy service provider, alongside Elimity, who developed the lightweight identity governance platform.
Both organizations encounter security leaders who are striving to manage user access but face various challenges.
Therefore, they will provide you with expert insights and best practices within the field of identity governance.
Interesting Reads
&#128073;  Insurance Company Took Control of User Access Within 3 Days
&#128073;  How To Prove That You Are In Control
For more information, visit Approach at www.approach-cyber.com and Elimity at www.elimity.com.
</itunes:summary>
            <itunes:subtitle>Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy.
User access governance projects however have a history of incurring multi-year roll-outs and requiring specialized personnel, making many...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>49:14</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;p&gt;Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy.&lt;/p&gt;
&lt;p&gt;User access governance projects however have a history of incurring multi-year roll-outs and requiring specialized personnel, making many companies shy away and bear excessive cyber risk.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;What to Expect?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;✅ Why Do Organizations Need Identity Visibility?&lt;/p&gt;
&lt;p&gt;&amp;nbsp;✅  5 Tips to Achieve This Within Days&lt;/p&gt;
&lt;p&gt;&amp;nbsp;✅  Customer Story of Financial Institution&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;Your Hosts?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This webinar is hosted by Approach Cyber, a dedicated cybersecurity and privacy service provider, alongside Elimity, who developed the lightweight identity governance platform.&lt;/p&gt;
&lt;p&gt;Both organizations encounter security leaders who are striving to manage user access but face various challenges.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Therefore, they will provide you with expert insights and best practices within the field of identity governance.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;Interesting Reads&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&#128073;&lt;a href="https://elimity.com/resources/customer-case-take-control-within-days" target="_self"&gt;  Insurance Company Took Control of User Access Within 3 Da&lt;/a&gt;ys&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&#128073; &lt;a href="https://elimity.com/resources/customer-case-take-control-within-days" target="_self"&gt; How To Prove That You Are In Contr&lt;/a&gt;ol&amp;nbsp;&lt;/p&gt;
&lt;p&gt;For more information, visit Approach at www.approach-cyber.com and Elimity at www.elimity.com.&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/identity-data-from-chaos-to-3"&gt;&lt;img src="http://videos.elimity.com/64968558/95967348/61ff2209a33640a8dfa2d823aecd9ff4/standard/download-6-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=61ff2209a33640a8dfa2d823aecd9ff4&amp;source=podcast&amp;photo%5fid=95967348" width="625" height="352" type="text/html" medium="video" duration="2954" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968558/95967348/61ff2209a33640a8dfa2d823aecd9ff4/standard/download-6-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968558/95967348/61ff2209a33640a8dfa2d823aecd9ff4/standard/download-6-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968566/95918937/7bd4ef2a69b4e95820540c2342052848/video_medium/3-ways-identity-data-analytics-7-video.mp4?source=podcast" type="video/mp4" length="163089078"/>
            <title>3 Ways Identity Data Analytics Drives IAM Success</title>
            <link>http://videos.elimity.com/3-ways-identity-data-analytics-7</link>
            <description>&lt;p&gt;&lt;p&gt;Are you grappling with Identity and Access Management (IAM) challenges?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Well, you're not alone.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Lack of visibility into user access, audit findings, and custom IAM reporting might be hindering your IAM efficiency.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Here's a case study: &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Large financial institution faced 3 main challenges related to understanding their IAM data:&lt;/p&gt;
&lt;p&gt;&#128073; Overwhelming and ever-increasing number of IAM data questions from stakeholders;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128073; High cost and inefficiency of creating custom reports and dashboards;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128073; Poor quality of IAM data;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The Impact: &lt;/strong&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;↳The organization relied on 5-8 employees working non-stop on manual IAM reporting;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;↳ It took the IAM team weeks to draft one IAM report;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;↳ Incomplete IAM data in reports leaves multiple, critical security gaps.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The New Approach: Self-Service Data Analytics&lt;/strong&gt;&lt;br&gt;&lt;br&gt;The financial industry leader applied self-service data analytics, integrated with its central IGA system, HR database and disconnected applications.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;These were the results:&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ Complete Overview of Users and Access&lt;/p&gt;
&lt;p&gt;✅ Immediate Access to IAM Insights for all Stakeholders&lt;/p&gt;
&lt;p&gt;✅ Continuous KPI Monitoring&lt;/p&gt;
&lt;p&gt;✅ Reduced Manual IAM Reporting&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Why Attend&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;↳ Customer Cases: How your peers answered the ever-growing IAM questions&lt;/p&gt;
&lt;p&gt;&amp;nbsp;↳ Expert Insights: Hear directly from IAM professionals who solved the challenges above&lt;/p&gt;
&lt;p&gt;&amp;nbsp;↳ Interactive Q&amp;amp;A: Get your specific IAM challenges addressed in a live Q&amp;amp;A session with our experts.&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/3-ways-identity-data-analytics-7"&gt;&lt;img src="http://videos.elimity.com/64968566/95918937/7bd4ef2a69b4e95820540c2342052848/standard/download-7-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/95918937</guid>
            <pubDate>Mon, 25 Mar 2024 19:49:47 GMT</pubDate>
            <media:title>3 Ways Identity Data Analytics Drives IAM Success</media:title>
            <itunes:summary>Are you grappling with Identity and Access Management (IAM) challenges?
Well, you're not alone.
Lack of visibility into user access, audit findings, and custom IAM reporting might be hindering your IAM efficiency.

Here's a case study: 
Large financial institution faced 3 main challenges related to understanding their IAM data:
&#128073; Overwhelming and ever-increasing number of IAM data questions from stakeholders;
&#128073; High cost and inefficiency of creating custom reports and dashboards;
&#128073; Poor quality of IAM data;

The Impact: 
↳The organization relied on 5-8 employees working non-stop on manual IAM reporting;
↳ It took the IAM team weeks to draft one IAM report;
↳ Incomplete IAM data in reports leaves multiple, critical security gaps.

The New Approach: Self-Service Data AnalyticsThe financial industry leader applied self-service data analytics, integrated with its central IGA system, HR database and disconnected applications.

These were the results:
✅ Complete Overview of Users and Access
✅ Immediate Access to IAM Insights for all Stakeholders
✅ Continuous KPI Monitoring
✅ Reduced Manual IAM Reporting

Why Attend
↳ Customer Cases: How your peers answered the ever-growing IAM questions
↳ Expert Insights: Hear directly from IAM professionals who solved the challenges above
↳ Interactive QA: Get your specific IAM challenges addressed in a live QA session with our experts.
</itunes:summary>
            <itunes:subtitle>Are you grappling with Identity and Access Management (IAM) challenges?
Well, you're not alone.
Lack of visibility into user access, audit findings, and custom IAM reporting might be hindering your IAM efficiency.

Here's a case study: 
Large...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>53:46</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;p&gt;Are you grappling with Identity and Access Management (IAM) challenges?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Well, you're not alone.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Lack of visibility into user access, audit findings, and custom IAM reporting might be hindering your IAM efficiency.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Here's a case study: &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Large financial institution faced 3 main challenges related to understanding their IAM data:&lt;/p&gt;
&lt;p&gt;&#128073; Overwhelming and ever-increasing number of IAM data questions from stakeholders;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128073; High cost and inefficiency of creating custom reports and dashboards;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128073; Poor quality of IAM data;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The Impact: &lt;/strong&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;↳The organization relied on 5-8 employees working non-stop on manual IAM reporting;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;↳ It took the IAM team weeks to draft one IAM report;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;↳ Incomplete IAM data in reports leaves multiple, critical security gaps.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The New Approach: Self-Service Data Analytics&lt;/strong&gt;&lt;br&gt;&lt;br&gt;The financial industry leader applied self-service data analytics, integrated with its central IGA system, HR database and disconnected applications.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;These were the results:&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ Complete Overview of Users and Access&lt;/p&gt;
&lt;p&gt;✅ Immediate Access to IAM Insights for all Stakeholders&lt;/p&gt;
&lt;p&gt;✅ Continuous KPI Monitoring&lt;/p&gt;
&lt;p&gt;✅ Reduced Manual IAM Reporting&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Why Attend&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;↳ Customer Cases: How your peers answered the ever-growing IAM questions&lt;/p&gt;
&lt;p&gt;&amp;nbsp;↳ Expert Insights: Hear directly from IAM professionals who solved the challenges above&lt;/p&gt;
&lt;p&gt;&amp;nbsp;↳ Interactive Q&amp;amp;A: Get your specific IAM challenges addressed in a live Q&amp;amp;A session with our experts.&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/3-ways-identity-data-analytics-7"&gt;&lt;img src="http://videos.elimity.com/64968566/95918937/7bd4ef2a69b4e95820540c2342052848/standard/download-7-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=7bd4ef2a69b4e95820540c2342052848&amp;source=podcast&amp;photo%5fid=95918937" width="625" height="352" type="text/html" medium="video" duration="3226" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968566/95918937/7bd4ef2a69b4e95820540c2342052848/standard/download-7-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968566/95918937/7bd4ef2a69b4e95820540c2342052848/standard/download-7-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968558/95206867/017405231417b76db8ce1fb154be6ca5/video_medium/elimity-insights-extended-demo-video.mp4?source=podcast" type="video/mp4" length="68812818"/>
            <title>Elimity Insights - Extended Demo &#128253;️</title>
            <link>http://videos.elimity.com/elimity-insights-extended-demo</link>
            <description>&lt;p&gt;&lt;p&gt;&lt;strong&gt;Case Study: Major Financial Institution with Over 55,000 Employees&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Financial industry leader faced 3 main challenges related to understanding their IAM data:&lt;/p&gt;
&lt;p&gt;&#128073; High cost and inefficiency of creating custom reports and dashboards;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128073; Overwhelming and ever-increasing number of IAM Data questions from stakeholders;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128073; Poor quality of IAM data;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The Impact: &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;↳The organization relied on 5-8 employees working non-stop on manual IAM reporting;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;↳ It took the IAM team weeks to draft one IAM report;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;↳ Incomplete IAM data in reports leaves multiple, critical security gaps.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The New Approach: Self-Service Data Analytics&lt;/strong&gt;&lt;br&gt;&lt;br&gt;The financial industry leader applied self-service data analytics, integrated with its central IGA system, HR database and disconnected applications. These were the results:&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ Immediate Access to IAM Insights for all Stakeholders&lt;/p&gt;
&lt;p&gt;✅ Continuous KPI Monitoring: The system enables ongoing tracking of IAM performance indicators.&lt;/p&gt;
&lt;p&gt;✅ Reduced Manual Work: Significant reduction in manual IAM tasks, leading to overhead cost savings.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Why Attend&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;↳ Expert Insights: Hear directly from IAM professionals who solved the challenges above&lt;/p&gt;
&lt;p&gt;&amp;nbsp;↳ Interactive Q&amp;amp;A: Get your specific IAM challenges addressed in a live Q&amp;amp;A session with our experts.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/elimity-insights-extended-demo"&gt;&lt;img src="http://videos.elimity.com/64968558/95206867/017405231417b76db8ce1fb154be6ca5/standard/download-16-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/95206867</guid>
            <pubDate>Thu, 29 Feb 2024 13:20:44 GMT</pubDate>
            <media:title>Elimity Insights - Extended Demo &#128253;️</media:title>
            <itunes:summary>Case Study: Major Financial Institution with Over 55,000 Employees

Financial industry leader faced 3 main challenges related to understanding their IAM data:
&#128073; High cost and inefficiency of creating custom reports and dashboards;
&#128073; Overwhelming and ever-increasing number of IAM Data questions from stakeholders;
&#128073; Poor quality of IAM data;

The Impact: 

↳The organization relied on 5-8 employees working non-stop on manual IAM reporting;
↳ It took the IAM team weeks to draft one IAM report;
↳ Incomplete IAM data in reports leaves multiple, critical security gaps.

The New Approach: Self-Service Data AnalyticsThe financial industry leader applied self-service data analytics, integrated with its central IGA system, HR database and disconnected applications. These were the results:

✅ Immediate Access to IAM Insights for all Stakeholders
✅ Continuous KPI Monitoring: The system enables ongoing tracking of IAM performance indicators.
✅ Reduced Manual Work: Significant reduction in manual IAM tasks, leading to overhead cost savings.

Why Attend
↳ Expert Insights: Hear directly from IAM professionals who solved the challenges above
↳ Interactive QA: Get your specific IAM challenges addressed in a live QA session with our experts.</itunes:summary>
            <itunes:subtitle>Case Study: Major Financial Institution with Over 55,000 Employees

Financial industry leader faced 3 main challenges related to understanding their IAM data:
&#128073; High cost and inefficiency of creating custom reports and dashboards;
&#128073; Overwhelming...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>25:27</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;p&gt;&lt;strong&gt;Case Study: Major Financial Institution with Over 55,000 Employees&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Financial industry leader faced 3 main challenges related to understanding their IAM data:&lt;/p&gt;
&lt;p&gt;&#128073; High cost and inefficiency of creating custom reports and dashboards;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128073; Overwhelming and ever-increasing number of IAM Data questions from stakeholders;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128073; Poor quality of IAM data;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The Impact: &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;↳The organization relied on 5-8 employees working non-stop on manual IAM reporting;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;↳ It took the IAM team weeks to draft one IAM report;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;↳ Incomplete IAM data in reports leaves multiple, critical security gaps.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The New Approach: Self-Service Data Analytics&lt;/strong&gt;&lt;br&gt;&lt;br&gt;The financial industry leader applied self-service data analytics, integrated with its central IGA system, HR database and disconnected applications. These were the results:&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ Immediate Access to IAM Insights for all Stakeholders&lt;/p&gt;
&lt;p&gt;✅ Continuous KPI Monitoring: The system enables ongoing tracking of IAM performance indicators.&lt;/p&gt;
&lt;p&gt;✅ Reduced Manual Work: Significant reduction in manual IAM tasks, leading to overhead cost savings.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Why Attend&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;↳ Expert Insights: Hear directly from IAM professionals who solved the challenges above&lt;/p&gt;
&lt;p&gt;&amp;nbsp;↳ Interactive Q&amp;amp;A: Get your specific IAM challenges addressed in a live Q&amp;amp;A session with our experts.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/elimity-insights-extended-demo"&gt;&lt;img src="http://videos.elimity.com/64968558/95206867/017405231417b76db8ce1fb154be6ca5/standard/download-16-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=017405231417b76db8ce1fb154be6ca5&amp;source=podcast&amp;photo%5fid=95206867" width="625" height="352" type="text/html" medium="video" duration="1527" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968558/95206867/017405231417b76db8ce1fb154be6ca5/standard/download-16-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968558/95206867/017405231417b76db8ce1fb154be6ca5/standard/download-16-thumbnail.jpg/thumbnail.jpg"/>
            <category>Demo</category>
            <category>IAM Reporting</category>
            <category>Identity Data Analytics</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968571/91836254/87250ecd355a9b189a391d4d7df8fa8a/video_medium/prove-that-youre-in-control-of-your-video.mp4?source=podcast" type="video/mp4" length="27156778"/>
            <title>Prove That You're In Control of Your Users and Their Access</title>
            <link>http://videos.elimity.com/prove-that-youre-in-control-of-your</link>
            <description>&lt;p&gt;&lt;h1&gt;How to That You're In Control of Your Users and Their Access&lt;br&gt;&lt;/h1&gt;&lt;h2&gt;Problem&lt;/h2&gt;&lt;p&gt;Over the last decade, IT complexity has grown to challenging levels. Almost every company now has to manage a large amount of applications in a complex IT infrastructure consisting of large amounts of accounts and permissions.&lt;/p&gt;&lt;br&gt;
&lt;h2&gt;Objective&lt;/h2&gt;Having control over who can access which data in such an environment is crucial for privacy, compliance and protecting against cyber threats.&lt;br&gt;
&lt;br&gt;&lt;h2&gt;What to expect?&lt;/h2&gt;&lt;p&gt;
In this guide, we’ll give you an overview of eight categories of key identity indicators focused on showing that you’re in control.&lt;/p&gt;
&lt;p&gt;These categories have proven to be complete for the majority of the organizations that strive for effective identity management and want to avoid major security risks.&lt;/p&gt;&lt;h2&gt;Next Steps&lt;/h2&gt;Download the guide so you can get started today &#128073; &lt;a href="https://elimity.com/guide-on-how-to-prove-that-you-are-in-control"&gt;elimity.com/guide-on-how-to-prove-that-you-are-in-control&lt;/a&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/prove-that-youre-in-control-of-your"&gt;&lt;img src="http://videos.elimity.com/64968571/91836254/87250ecd355a9b189a391d4d7df8fa8a/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/91836254</guid>
            <pubDate>Tue, 19 Dec 2023 09:52:14 GMT</pubDate>
            <media:title>Prove That You're In Control of Your Users and Their Access</media:title>
            <itunes:summary>How to That You're In Control of Your Users and Their AccessProblemOver the last decade, IT complexity has grown to challenging levels. Almost every company now has to manage a large amount of applications in a complex IT infrastructure consisting of large amounts of accounts and permissions.
ObjectiveHaving control over who can access which data in such an environment is crucial for privacy, compliance and protecting against cyber threats.
What to expect?
In this guide, we’ll give you an overview of eight categories of key identity indicators focused on showing that you’re in control.
These categories have proven to be complete for the majority of the organizations that strive for effective identity management and want to avoid major security risks.Next StepsDownload the guide so you can get started today &#128073; elimity.com/guide-on-how-to-prove-that-you-are-in-control</itunes:summary>
            <itunes:subtitle>How to That You're In Control of Your Users and Their AccessProblemOver the last decade, IT complexity has grown to challenging levels. Almost every company now has to manage a large amount of applications in a complex IT infrastructure consisting...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>06:43</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;h1&gt;How to That You're In Control of Your Users and Their Access&lt;br&gt;&lt;/h1&gt;&lt;h2&gt;Problem&lt;/h2&gt;&lt;p&gt;Over the last decade, IT complexity has grown to challenging levels. Almost every company now has to manage a large amount of applications in a complex IT infrastructure consisting of large amounts of accounts and permissions.&lt;/p&gt;&lt;br&gt;
&lt;h2&gt;Objective&lt;/h2&gt;Having control over who can access which data in such an environment is crucial for privacy, compliance and protecting against cyber threats.&lt;br&gt;
&lt;br&gt;&lt;h2&gt;What to expect?&lt;/h2&gt;&lt;p&gt;
In this guide, we’ll give you an overview of eight categories of key identity indicators focused on showing that you’re in control.&lt;/p&gt;
&lt;p&gt;These categories have proven to be complete for the majority of the organizations that strive for effective identity management and want to avoid major security risks.&lt;/p&gt;&lt;h2&gt;Next Steps&lt;/h2&gt;Download the guide so you can get started today &#128073; &lt;a href="https://elimity.com/guide-on-how-to-prove-that-you-are-in-control"&gt;elimity.com/guide-on-how-to-prove-that-you-are-in-control&lt;/a&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/prove-that-youre-in-control-of-your"&gt;&lt;img src="http://videos.elimity.com/64968571/91836254/87250ecd355a9b189a391d4d7df8fa8a/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=87250ecd355a9b189a391d4d7df8fa8a&amp;source=podcast&amp;photo%5fid=91836254" width="625" height="352" type="text/html" medium="video" duration="403" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968571/91836254/87250ecd355a9b189a391d4d7df8fa8a/standard/download-9-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968571/91836254/87250ecd355a9b189a391d4d7df8fa8a/standard/download-9-thumbnail.jpg/thumbnail.jpg"/>
            <category>Cybersecurity</category>
            <category>IAM KPI</category>
            <category>Identity and Access Management</category>
            <category>Identity Governance</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968569/91407132/66b3d67e2502b8406f345a9d2c85b24e/video_medium/the-8-challenges-of-fragmented-iam-video.mp4?source=podcast" type="video/mp4" length="3696926"/>
            <title>The 8 Challenges of Fragmented IAM Reporting</title>
            <link>http://videos.elimity.com/the-8-challenges-of-fragmented-iam</link>
            <description>&lt;p&gt;&lt;span&gt;Explore the challenges encountered by mature IAM teams despite effective governance processes. &lt;br&gt;&lt;br&gt;Maarten Decat, CEO and Co-Founder of Elimity,&amp;nbsp;highlights issues such as opaque approval processes, data quality challenges in IGA, high costs in RBAC deployment, and audit findings arising from disconnected critical systems.&lt;br&gt;&lt;br&gt;These hurdles underscore the need for solutions like Elimity Insights to address these IAM complexities.&lt;/span&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/the-8-challenges-of-fragmented-iam"&gt;&lt;img src="http://videos.elimity.com/64968569/91407132/66b3d67e2502b8406f345a9d2c85b24e/standard/download-20-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/91407132</guid>
            <pubDate>Wed, 06 Dec 2023 14:01:34 GMT</pubDate>
            <media:title>The 8 Challenges of Fragmented IAM Reporting</media:title>
            <itunes:summary>Explore the challenges encountered by mature IAM teams despite effective governance processes. Maarten Decat, CEO and Co-Founder of Elimity,highlights issues such as opaque approval processes, data quality challenges in IGA, high costs in RBAC deployment, and audit findings arising from disconnected critical systems.These hurdles underscore the need for solutions like Elimity Insights to address these IAM complexities.</itunes:summary>
            <itunes:subtitle>Explore the challenges encountered by mature IAM teams despite effective governance processes. Maarten Decat, CEO and Co-Founder of Elimity,highlights issues such as opaque approval processes, data quality challenges in IGA, high costs in RBAC...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:15</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;span&gt;Explore the challenges encountered by mature IAM teams despite effective governance processes. &lt;br&gt;&lt;br&gt;Maarten Decat, CEO and Co-Founder of Elimity,&amp;nbsp;highlights issues such as opaque approval processes, data quality challenges in IGA, high costs in RBAC deployment, and audit findings arising from disconnected critical systems.&lt;br&gt;&lt;br&gt;These hurdles underscore the need for solutions like Elimity Insights to address these IAM complexities.&lt;/span&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/the-8-challenges-of-fragmented-iam"&gt;&lt;img src="http://videos.elimity.com/64968569/91407132/66b3d67e2502b8406f345a9d2c85b24e/standard/download-20-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=66b3d67e2502b8406f345a9d2c85b24e&amp;source=podcast&amp;photo%5fid=91407132" width="625" height="352" type="text/html" medium="video" duration="75" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968569/91407132/66b3d67e2502b8406f345a9d2c85b24e/standard/download-20-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968569/91407132/66b3d67e2502b8406f345a9d2c85b24e/standard/download-20-thumbnail.jpg/thumbnail.jpg"/>
            <category>IAM Reporting</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968569/91407117/d785d0384a443ed9f804b02a8cc71139/video_medium/what-is-fragmented-iam-reporting-video.mp4?source=podcast" type="video/mp4" length="4944436"/>
            <title>What is Fragmented IAM Reporting?</title>
            <link>http://videos.elimity.com/what-is-fragmented-iam-reporting</link>
            <description>&lt;p&gt;&lt;span&gt;Discover the limitations of traditional IAM reporting methods, including reliance on pre-built reports, Excel sheets, and manual data interpretation, leading to inefficiencies and outdated insights.&lt;br&gt;&lt;br&gt;Maarten Decat, CEO and Co-Founder of Elimity, explains you about the attempts by advanced IAM teams to address these issues through data lakes and analytics tools but encountering limitations in scalability and cost-effectiveness. &lt;/span&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/what-is-fragmented-iam-reporting"&gt;&lt;img src="http://videos.elimity.com/64968569/91407117/d785d0384a443ed9f804b02a8cc71139/standard/download-14-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/91407117</guid>
            <pubDate>Wed, 06 Dec 2023 14:01:34 GMT</pubDate>
            <media:title>What is Fragmented IAM Reporting?</media:title>
            <itunes:summary>Discover the limitations of traditional IAM reporting methods, including reliance on pre-built reports, Excel sheets, and manual data interpretation, leading to inefficiencies and outdated insights.Maarten Decat, CEO and Co-Founder of Elimity, explains you about the attempts by advanced IAM teams to address these issues through data lakes and analytics tools but encountering limitations in scalability and cost-effectiveness. </itunes:summary>
            <itunes:subtitle>Discover the limitations of traditional IAM reporting methods, including reliance on pre-built reports, Excel sheets, and manual data interpretation, leading to inefficiencies and outdated insights.Maarten Decat, CEO and Co-Founder of Elimity,...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:23</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;span&gt;Discover the limitations of traditional IAM reporting methods, including reliance on pre-built reports, Excel sheets, and manual data interpretation, leading to inefficiencies and outdated insights.&lt;br&gt;&lt;br&gt;Maarten Decat, CEO and Co-Founder of Elimity, explains you about the attempts by advanced IAM teams to address these issues through data lakes and analytics tools but encountering limitations in scalability and cost-effectiveness. &lt;/span&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/what-is-fragmented-iam-reporting"&gt;&lt;img src="http://videos.elimity.com/64968569/91407117/d785d0384a443ed9f804b02a8cc71139/standard/download-14-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=d785d0384a443ed9f804b02a8cc71139&amp;source=podcast&amp;photo%5fid=91407117" width="625" height="352" type="text/html" medium="video" duration="83" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968569/91407117/d785d0384a443ed9f804b02a8cc71139/standard/download-14-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968569/91407117/d785d0384a443ed9f804b02a8cc71139/standard/download-14-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968561/91299554/2e08692333732c09eb883a0a9e2a8898/video_medium/customer-case-pharma-company-needs-video.mp4?source=podcast" type="video/mp4" length="4733445"/>
            <title>[Customer Case] Pharma Company Needs IAM Visibility</title>
            <link>http://videos.elimity.com/customer-case-pharma-company-needs</link>
            <description>&lt;p&gt;&lt;span&gt;&lt;h2&gt;Customer Profile &#128064;&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;Global BioPharma Company&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Active in 40 countries worldwide&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;About 10k users&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Big SAP Landscape&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;IGA in place for 5+ years&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Challenges&amp;nbsp;&lt;/h2&gt;&lt;p&gt;A global biopharma company failed audit findings regarding identity visibility. Specific SAP reporting required which is not available out of the box. On top of that, many systems were still not connected to SAP, and unstructured data has been neglected. &lt;/p&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/customer-case-pharma-company-needs"&gt;&lt;img src="http://videos.elimity.com/64968561/91299554/2e08692333732c09eb883a0a9e2a8898/standard/download-13-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/91299554</guid>
            <pubDate>Mon, 04 Dec 2023 12:32:36 GMT</pubDate>
            <media:title>[Customer Case] Pharma Company Needs IAM Visibility</media:title>
            <itunes:summary>Customer Profile &#128064;Global BioPharma CompanyActive in 40 countries worldwideAbout 10k usersBig SAP LandscapeIGA in place for 5+ yearsChallengesA global biopharma company failed audit findings regarding identity visibility. Specific SAP reporting required which is not available out of the box. On top of that, many systems were still not connected to SAP, and unstructured data has been neglected. </itunes:summary>
            <itunes:subtitle>Customer Profile &#128064;Global BioPharma CompanyActive in 40 countries worldwideAbout 10k usersBig SAP LandscapeIGA in place for 5+ yearsChallengesA global biopharma company failed audit findings regarding identity visibility. Specific SAP reporting...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:51</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;span&gt;&lt;h2&gt;Customer Profile &#128064;&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;Global BioPharma Company&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Active in 40 countries worldwide&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;About 10k users&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Big SAP Landscape&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;IGA in place for 5+ years&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Challenges&amp;nbsp;&lt;/h2&gt;&lt;p&gt;A global biopharma company failed audit findings regarding identity visibility. Specific SAP reporting required which is not available out of the box. On top of that, many systems were still not connected to SAP, and unstructured data has been neglected. &lt;/p&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/customer-case-pharma-company-needs"&gt;&lt;img src="http://videos.elimity.com/64968561/91299554/2e08692333732c09eb883a0a9e2a8898/standard/download-13-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=2e08692333732c09eb883a0a9e2a8898&amp;source=podcast&amp;photo%5fid=91299554" width="625" height="352" type="text/html" medium="video" duration="111" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968561/91299554/2e08692333732c09eb883a0a9e2a8898/standard/download-13-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968561/91299554/2e08692333732c09eb883a0a9e2a8898/standard/download-13-thumbnail.jpg/thumbnail.jpg"/>
            <category>identity data analytics</category>
            <category>iga</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968561/91299556/c471ebf3f4a1fa8ce8d45f35c3cea52a/video_medium/customer-case-retail-has-complex-video.mp4?source=podcast" type="video/mp4" length="3539164"/>
            <title>[Customer Case] Retail Has Complex IAM Landscape</title>
            <link>http://videos.elimity.com/customer-case-retail-has-complex</link>
            <description>&lt;p&gt;&lt;h2&gt;Customer Profile &#128064;&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;span&gt;&lt;u&gt;&lt;/u&gt;Multinational Retail Company&lt;/span&gt;&lt;/li&gt;&lt;li&gt;Active Worldwide&lt;/li&gt;&lt;li&gt;About 400k Users&lt;/li&gt;&lt;li&gt;Extremely Complex IAM landscape with multiple HR systems, domains, directories and IGAs&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Challenges&amp;nbsp;&lt;/h2&gt;&lt;span&gt;&lt;p&gt;A multinational retail company has multiple identity systems which have diverged, leading to inconsistencies, issues in provisioning workflows and large overhead for the helpdesk.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The IAM team tried to perform root cause analysis with manual data exports and Excel sheets., which resulted in many complex data questions without answers and no correct estimation of cyber security risks.&lt;br&gt;&lt;/p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/customer-case-retail-has-complex"&gt;&lt;img src="http://videos.elimity.com/64968561/91299556/c471ebf3f4a1fa8ce8d45f35c3cea52a/standard/download-32-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/91299556</guid>
            <pubDate>Mon, 04 Dec 2023 12:28:26 GMT</pubDate>
            <media:title>[Customer Case] Retail Has Complex IAM Landscape</media:title>
            <itunes:summary>Customer Profile &#128064;Multinational Retail CompanyActive WorldwideAbout 400k UsersExtremely Complex IAM landscape with multiple HR systems, domains, directories and IGAsChallengesA multinational retail company has multiple identity systems which have diverged, leading to inconsistencies, issues in provisioning workflows and large overhead for the helpdesk.The IAM team tried to perform root cause analysis with manual data exports and Excel sheets., which resulted in many complex data questions without answers and no correct estimation of cyber security risks.</itunes:summary>
            <itunes:subtitle>Customer Profile &#128064;Multinational Retail CompanyActive WorldwideAbout 400k UsersExtremely Complex IAM landscape with multiple HR systems, domains, directories and IGAsChallengesA multinational retail company has multiple identity systems which have...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:15</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;h2&gt;Customer Profile &#128064;&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;span&gt;&lt;u&gt;&lt;/u&gt;Multinational Retail Company&lt;/span&gt;&lt;/li&gt;&lt;li&gt;Active Worldwide&lt;/li&gt;&lt;li&gt;About 400k Users&lt;/li&gt;&lt;li&gt;Extremely Complex IAM landscape with multiple HR systems, domains, directories and IGAs&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Challenges&amp;nbsp;&lt;/h2&gt;&lt;span&gt;&lt;p&gt;A multinational retail company has multiple identity systems which have diverged, leading to inconsistencies, issues in provisioning workflows and large overhead for the helpdesk.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The IAM team tried to perform root cause analysis with manual data exports and Excel sheets., which resulted in many complex data questions without answers and no correct estimation of cyber security risks.&lt;br&gt;&lt;/p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/customer-case-retail-has-complex"&gt;&lt;img src="http://videos.elimity.com/64968561/91299556/c471ebf3f4a1fa8ce8d45f35c3cea52a/standard/download-32-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=c471ebf3f4a1fa8ce8d45f35c3cea52a&amp;source=podcast&amp;photo%5fid=91299556" width="625" height="352" type="text/html" medium="video" duration="75" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968561/91299556/c471ebf3f4a1fa8ce8d45f35c3cea52a/standard/download-32-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968561/91299556/c471ebf3f4a1fa8ce8d45f35c3cea52a/standard/download-32-thumbnail.jpg/thumbnail.jpg"/>
            <category>identity data analytics</category>
            <category>iga</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968561/91299546/0598ccd6279e364a1ed33a2c5ae7f384/video_medium/customer-case-fortune-500-bank-video.mp4?source=podcast" type="video/mp4" length="8830529"/>
            <title>[Customer Case] Fortune-500 Bank Needs IAM insights at scale</title>
            <link>http://videos.elimity.com/customer-case-fortune-500-bank</link>
            <description>&lt;p&gt;&lt;h2&gt;Customer Profile &#128064;&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;u&gt;&lt;/u&gt;Fortune-500 bank&lt;/li&gt;&lt;li&gt;About 35k Employees&lt;/li&gt;&lt;li&gt;Highly Mature IGA Deployment (+5 Years)&lt;/li&gt;&lt;/ul&gt;AND&lt;br&gt;&lt;ul&gt;&lt;li&gt;European Bank&lt;/li&gt;&lt;li&gt;About 6k Employees&lt;/li&gt;&lt;li&gt;Highly Mature IGA Deployment (5+ Years)&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Challenges&amp;nbsp;&lt;/h2&gt;&lt;p&gt;A multinational retail company has multiple identity systems which have diverged, leading to inconsistencies, issues in provisioning workflows and large overhead for the helpdesk.&amp;nbsp;&lt;/p&gt;&lt;span&gt;&lt;p&gt;The IAM team tried to perform root cause analysis with manual data exports and Excel sheets., which resulted in many complex data questions without answers and no correct estimation of cyber security risks.Fortune-500 bank has a mature IGA deployment with many systems connected and much data present, but many users still have not received the information they need.&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;System owners: who can access my application?&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;IAM expert: what should I put in a role for team X?&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Security experts: orphaned accounts?&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;The IAM Team attempted to report through its current IGA, Excel sheets or PowerBI. But this resulted in a large CTO for reporting (many people involved, lots of time wasted) and overly high cyber risks.&lt;/p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/customer-case-fortune-500-bank"&gt;&lt;img src="http://videos.elimity.com/64968561/91299546/0598ccd6279e364a1ed33a2c5ae7f384/standard/download-44-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/91299546</guid>
            <pubDate>Mon, 04 Dec 2023 12:19:15 GMT</pubDate>
            <media:title>[Customer Case] Fortune-500 Bank Needs IAM insights at scale</media:title>
            <itunes:summary>Customer Profile &#128064;Fortune-500 bankAbout 35k EmployeesHighly Mature IGA Deployment (+5 Years)ANDEuropean BankAbout 6k EmployeesHighly Mature IGA Deployment (5+ Years)ChallengesA multinational retail company has multiple identity systems which have diverged, leading to inconsistencies, issues in provisioning workflows and large overhead for the helpdesk.The IAM team tried to perform root cause analysis with manual data exports and Excel sheets., which resulted in many complex data questions without answers and no correct estimation of cyber security risks.Fortune-500 bank has a mature IGA deployment with many systems connected and much data present, but many users still have not received the information they need.System owners: who can access my application?IAM expert: what should I put in a role for team X?Security experts: orphaned accounts?The IAM Team attempted to report through its current IGA, Excel sheets or PowerBI. But this resulted in a large CTO for reporting (many people involved, lots of time wasted) and overly high cyber risks.</itunes:summary>
            <itunes:subtitle>Customer Profile &#128064;Fortune-500 bankAbout 35k EmployeesHighly Mature IGA Deployment (+5 Years)ANDEuropean BankAbout 6k EmployeesHighly Mature IGA Deployment (5+ Years)ChallengesA multinational retail company has multiple identity systems which have...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>02:51</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;h2&gt;Customer Profile &#128064;&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;u&gt;&lt;/u&gt;Fortune-500 bank&lt;/li&gt;&lt;li&gt;About 35k Employees&lt;/li&gt;&lt;li&gt;Highly Mature IGA Deployment (+5 Years)&lt;/li&gt;&lt;/ul&gt;AND&lt;br&gt;&lt;ul&gt;&lt;li&gt;European Bank&lt;/li&gt;&lt;li&gt;About 6k Employees&lt;/li&gt;&lt;li&gt;Highly Mature IGA Deployment (5+ Years)&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Challenges&amp;nbsp;&lt;/h2&gt;&lt;p&gt;A multinational retail company has multiple identity systems which have diverged, leading to inconsistencies, issues in provisioning workflows and large overhead for the helpdesk.&amp;nbsp;&lt;/p&gt;&lt;span&gt;&lt;p&gt;The IAM team tried to perform root cause analysis with manual data exports and Excel sheets., which resulted in many complex data questions without answers and no correct estimation of cyber security risks.Fortune-500 bank has a mature IGA deployment with many systems connected and much data present, but many users still have not received the information they need.&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;System owners: who can access my application?&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;IAM expert: what should I put in a role for team X?&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Security experts: orphaned accounts?&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;The IAM Team attempted to report through its current IGA, Excel sheets or PowerBI. But this resulted in a large CTO for reporting (many people involved, lots of time wasted) and overly high cyber risks.&lt;/p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/customer-case-fortune-500-bank"&gt;&lt;img src="http://videos.elimity.com/64968561/91299546/0598ccd6279e364a1ed33a2c5ae7f384/standard/download-44-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=0598ccd6279e364a1ed33a2c5ae7f384&amp;source=podcast&amp;photo%5fid=91299546" width="625" height="352" type="text/html" medium="video" duration="171" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968561/91299546/0598ccd6279e364a1ed33a2c5ae7f384/standard/download-44-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968561/91299546/0598ccd6279e364a1ed33a2c5ae7f384/standard/download-44-thumbnail.jpg/thumbnail.jpg"/>
            <category>identity data analytics</category>
            <category>iga</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968571/91182072/8f6efcb32ab35cb480acfd0a55a7cb3b/video_medium/how-to-prove-that-you-are-in-video.mp4?source=podcast" type="video/mp4" length="1227122"/>
            <title>How To Prove That You Are In Control of Users and Their Access?</title>
            <link>http://videos.elimity.com/how-to-prove-that-you-are-in</link>
            <description>&lt;p&gt;As security team it is essential to show the management that you are in control of your employees and their access to valuable data.&lt;/p&gt;
&lt;p&gt;Learn how you can prove control in this short tutorial video! &#128249;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/how-to-prove-that-you-are-in"&gt;&lt;img src="http://videos.elimity.com/64968571/91182072/8f6efcb32ab35cb480acfd0a55a7cb3b/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/91182072</guid>
            <pubDate>Wed, 29 Nov 2023 15:15:34 GMT</pubDate>
            <media:title>How To Prove That You Are In Control of Users and Their Access?</media:title>
            <itunes:summary>As security team it is essential to show the management that you are in control of your employees and their access to valuable data.
Learn how you can prove control in this short tutorial video! &#128249;</itunes:summary>
            <itunes:subtitle>As security team it is essential to show the management that you are in control of your employees and their access to valuable data.
Learn how you can prove control in this short tutorial video! &#128249;</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>00:22</itunes:duration>
            <media:description type="html">&lt;p&gt;As security team it is essential to show the management that you are in control of your employees and their access to valuable data.&lt;/p&gt;
&lt;p&gt;Learn how you can prove control in this short tutorial video! &#128249;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/how-to-prove-that-you-are-in"&gt;&lt;img src="http://videos.elimity.com/64968571/91182072/8f6efcb32ab35cb480acfd0a55a7cb3b/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=8f6efcb32ab35cb480acfd0a55a7cb3b&amp;source=podcast&amp;photo%5fid=91182072" width="625" height="352" type="text/html" medium="video" duration="22" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968571/91182072/8f6efcb32ab35cb480acfd0a55a7cb3b/standard/download-9-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968571/91182072/8f6efcb32ab35cb480acfd0a55a7cb3b/standard/download-9-thumbnail.jpg/thumbnail.jpg"/>
            <category>Tuturial</category>
            <category>User Access</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968577/91181637/1f21cfc7b593f769e33fb8ad8dd00c44/video_medium/3-minute-product-video-video.mp4?source=podcast" type="video/mp4" length="14028286"/>
            <title>3-Minute Product Video</title>
            <link>http://videos.elimity.com/3-minute-product-video</link>
            <description>&lt;p&gt;Elimity Insights lets you easily understand who can currently access what, identify risks, act upon these and prove that you've taken action afterwards. Watch now the 3-minute product video! &#128071;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/3-minute-product-video"&gt;&lt;img src="http://videos.elimity.com/64968577/91181637/1f21cfc7b593f769e33fb8ad8dd00c44/standard/download-37-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/91181637</guid>
            <pubDate>Wed, 29 Nov 2023 15:05:20 GMT</pubDate>
            <media:title>3-Minute Product Video</media:title>
            <itunes:summary>Elimity Insights lets you easily understand who can currently access what, identify risks, act upon these and prove that you've taken action afterwards. Watch now the 3-minute product video! &#128071;</itunes:summary>
            <itunes:subtitle>Elimity Insights lets you easily understand who can currently access what, identify risks, act upon these and prove that you've taken action afterwards. Watch now the 3-minute product video! &#128071;</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>02:50</itunes:duration>
            <media:description type="html">&lt;p&gt;Elimity Insights lets you easily understand who can currently access what, identify risks, act upon these and prove that you've taken action afterwards. Watch now the 3-minute product video! &#128071;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/3-minute-product-video"&gt;&lt;img src="http://videos.elimity.com/64968577/91181637/1f21cfc7b593f769e33fb8ad8dd00c44/standard/download-37-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=1f21cfc7b593f769e33fb8ad8dd00c44&amp;source=podcast&amp;photo%5fid=91181637" width="625" height="391" type="text/html" medium="video" duration="170" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968577/91181637/1f21cfc7b593f769e33fb8ad8dd00c44/standard/download-37-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968577/91181637/1f21cfc7b593f769e33fb8ad8dd00c44/standard/download-37-thumbnail.jpg/thumbnail.jpg"/>
            <category>Demo</category>
            <category>Product Video</category>
        </item>
    </channel>
</rss>
