<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd">
    <channel>
        <itunes:owner>
            <itunes:name>Elimity</itunes:name>
            <itunes:email>chiel@elimity.com</itunes:email>
        </itunes:owner>
        <title>Elimity</title>
        <link>https://videos.elimity.com</link>
        <description></description>
        <language>en-us</language>
        <generator>Visualplatform</generator>
        <docs>http://blogs.law.harvard.edu/tech/rss</docs>
        <itunes:author>Elimity</itunes:author>
        <itunes:type>episodic</itunes:type>
        <itunes:explicit>no</itunes:explicit>
        <itunes:image href="https://videos.elimity.com/files/rv0.0/sitelogo.gif"/>
        <image>
            <url>https://videos.elimity.com/files/rv0.0/sitelogo.gif</url>
            <title>Elimity</title>
            <link>https://videos.elimity.com</link>
        </image>
        <atom:link rel="self" href="https://videos.elimity.com/podcast/tag/Identity Governance"/>
        <atom:link rel="next" href="https://videos.elimity.com/podcast/tag/Identity Governance?tag=Identity+Governance&amp;p=2&amp;podcast%5fp=t&amp;https="/>
        <item>
            <enclosure url="http://videos.elimity.com/64968569/101971575/8a93d34c57aa8c076aa75e7f3047bcae/video_medium/iam-and-nis-2-5-tips-to-take-video.mp4?source=podcast" type="video/mp4" length="56270749"/>
            <title>IAM and NIS 2: 5 Tips to Take Control of User Access Within Days </title>
            <link>http://videos.elimity.com/iam-and-nis-2-5-tips-to-take</link>
            <description>&lt;p&gt;NIS2 requires you to be in control of all aspects of your cybersecurity. 

With over 90% of attacks exploiting user access, controlling user access has become key to achieving NIS2-compliance.

✅ NIS2 and IAM: The Ins and Outs
✅ 5 Tips how to Control User Access within Days
✅ Customer Cases at industry leaders such as NMBS, Attentia and Federale&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/iam-and-nis-2-5-tips-to-take"&gt;&lt;img src="http://videos.elimity.com/64968569/101971575/8a93d34c57aa8c076aa75e7f3047bcae/standard/download-11-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/101971575</guid>
            <pubDate>Mon, 02 Feb 2026 11:51:12 GMT</pubDate>
            <media:title>IAM and NIS 2: 5 Tips to Take Control of User Access Within Days </media:title>
            <itunes:summary>NIS2 requires you to be in control of all aspects of your cybersecurity. 

With over 90% of attacks exploiting user access, controlling user access has become key to achieving NIS2-compliance.

✅ NIS2 and IAM: The Ins and Outs
✅ 5 Tips how to Control User Access within Days
✅ Customer Cases at industry leaders such as NMBS, Attentia and Federale</itunes:summary>
            <itunes:subtitle>NIS2 requires you to be in control of all aspects of your cybersecurity. 

With over 90% of attacks exploiting user access, controlling user access has become key to achieving NIS2-compliance.

✅ NIS2 and IAM: The Ins and Outs
✅ 5 Tips how to...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>22:21</itunes:duration>
            <media:description type="html">&lt;p&gt;NIS2 requires you to be in control of all aspects of your cybersecurity. 

With over 90% of attacks exploiting user access, controlling user access has become key to achieving NIS2-compliance.

✅ NIS2 and IAM: The Ins and Outs
✅ 5 Tips how to Control User Access within Days
✅ Customer Cases at industry leaders such as NMBS, Attentia and Federale&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/iam-and-nis-2-5-tips-to-take"&gt;&lt;img src="http://videos.elimity.com/64968569/101971575/8a93d34c57aa8c076aa75e7f3047bcae/standard/download-11-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=8a93d34c57aa8c076aa75e7f3047bcae&amp;source=podcast&amp;photo%5fid=101971575" width="625" height="352" type="text/html" medium="video" duration="1341" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968569/101971575/8a93d34c57aa8c076aa75e7f3047bcae/standard/download-11-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968569/101971575/8a93d34c57aa8c076aa75e7f3047bcae/standard/download-11-thumbnail.jpg/thumbnail.jpg"/>
            <category>IAM</category>
            <category>Identity Governance</category>
            <category>Keynote</category>
            <category>NIS2</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968571/91836254/87250ecd355a9b189a391d4d7df8fa8a/video_medium/prove-that-youre-in-control-of-your-video.mp4?source=podcast" type="video/mp4" length="27156778"/>
            <title>Prove That You're In Control of Your Users and Their Access</title>
            <link>http://videos.elimity.com/prove-that-youre-in-control-of-your</link>
            <description>&lt;p&gt;&lt;h1&gt;How to That You're In Control of Your Users and Their Access&lt;br&gt;&lt;/h1&gt;&lt;h2&gt;Problem&lt;/h2&gt;&lt;p&gt;Over the last decade, IT complexity has grown to challenging levels. Almost every company now has to manage a large amount of applications in a complex IT infrastructure consisting of large amounts of accounts and permissions.&lt;/p&gt;&lt;br&gt;
&lt;h2&gt;Objective&lt;/h2&gt;Having control over who can access which data in such an environment is crucial for privacy, compliance and protecting against cyber threats.&lt;br&gt;
&lt;br&gt;&lt;h2&gt;What to expect?&lt;/h2&gt;&lt;p&gt;
In this guide, we’ll give you an overview of eight categories of key identity indicators focused on showing that you’re in control.&lt;/p&gt;
&lt;p&gt;These categories have proven to be complete for the majority of the organizations that strive for effective identity management and want to avoid major security risks.&lt;/p&gt;&lt;h2&gt;Next Steps&lt;/h2&gt;Download the guide so you can get started today &#128073; &lt;a href="https://elimity.com/guide-on-how-to-prove-that-you-are-in-control"&gt;elimity.com/guide-on-how-to-prove-that-you-are-in-control&lt;/a&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/prove-that-youre-in-control-of-your"&gt;&lt;img src="http://videos.elimity.com/64968571/91836254/87250ecd355a9b189a391d4d7df8fa8a/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/91836254</guid>
            <pubDate>Tue, 19 Dec 2023 09:52:14 GMT</pubDate>
            <media:title>Prove That You're In Control of Your Users and Their Access</media:title>
            <itunes:summary>How to That You're In Control of Your Users and Their AccessProblemOver the last decade, IT complexity has grown to challenging levels. Almost every company now has to manage a large amount of applications in a complex IT infrastructure consisting of large amounts of accounts and permissions.
ObjectiveHaving control over who can access which data in such an environment is crucial for privacy, compliance and protecting against cyber threats.
What to expect?
In this guide, we’ll give you an overview of eight categories of key identity indicators focused on showing that you’re in control.
These categories have proven to be complete for the majority of the organizations that strive for effective identity management and want to avoid major security risks.Next StepsDownload the guide so you can get started today &#128073; elimity.com/guide-on-how-to-prove-that-you-are-in-control</itunes:summary>
            <itunes:subtitle>How to That You're In Control of Your Users and Their AccessProblemOver the last decade, IT complexity has grown to challenging levels. Almost every company now has to manage a large amount of applications in a complex IT infrastructure consisting...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>06:43</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;h1&gt;How to That You're In Control of Your Users and Their Access&lt;br&gt;&lt;/h1&gt;&lt;h2&gt;Problem&lt;/h2&gt;&lt;p&gt;Over the last decade, IT complexity has grown to challenging levels. Almost every company now has to manage a large amount of applications in a complex IT infrastructure consisting of large amounts of accounts and permissions.&lt;/p&gt;&lt;br&gt;
&lt;h2&gt;Objective&lt;/h2&gt;Having control over who can access which data in such an environment is crucial for privacy, compliance and protecting against cyber threats.&lt;br&gt;
&lt;br&gt;&lt;h2&gt;What to expect?&lt;/h2&gt;&lt;p&gt;
In this guide, we’ll give you an overview of eight categories of key identity indicators focused on showing that you’re in control.&lt;/p&gt;
&lt;p&gt;These categories have proven to be complete for the majority of the organizations that strive for effective identity management and want to avoid major security risks.&lt;/p&gt;&lt;h2&gt;Next Steps&lt;/h2&gt;Download the guide so you can get started today &#128073; &lt;a href="https://elimity.com/guide-on-how-to-prove-that-you-are-in-control"&gt;elimity.com/guide-on-how-to-prove-that-you-are-in-control&lt;/a&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/prove-that-youre-in-control-of-your"&gt;&lt;img src="http://videos.elimity.com/64968571/91836254/87250ecd355a9b189a391d4d7df8fa8a/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=87250ecd355a9b189a391d4d7df8fa8a&amp;source=podcast&amp;photo%5fid=91836254" width="625" height="352" type="text/html" medium="video" duration="403" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968571/91836254/87250ecd355a9b189a391d4d7df8fa8a/standard/download-9-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968571/91836254/87250ecd355a9b189a391d4d7df8fa8a/standard/download-9-thumbnail.jpg/thumbnail.jpg"/>
            <category>Cybersecurity</category>
            <category>IAM KPI</category>
            <category>Identity and Access Management</category>
            <category>Identity Governance</category>
        </item>
    </channel>
</rss>
