<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd">
    <channel>
        <itunes:owner>
            <itunes:name>Elimity</itunes:name>
            <itunes:email>chiel@elimity.com</itunes:email>
        </itunes:owner>
        <title>Elimity</title>
        <link>https://videos.elimity.com</link>
        <description></description>
        <language>en-us</language>
        <generator>Visualplatform</generator>
        <docs>http://blogs.law.harvard.edu/tech/rss</docs>
        <itunes:author>Elimity</itunes:author>
        <itunes:type>episodic</itunes:type>
        <itunes:explicit>no</itunes:explicit>
        <itunes:image href="https://videos.elimity.com/files/rv0.0/sitelogo.gif"/>
        <image>
            <url>https://videos.elimity.com/files/rv0.0/sitelogo.gif</url>
            <title>Elimity</title>
            <link>https://videos.elimity.com</link>
        </image>
        <atom:link rel="self" href="https://videos.elimity.com/podcast/tag/lightweight identity governance"/>
        <atom:link rel="next" href="https://videos.elimity.com/podcast/tag/lightweight identity governance?tag=lightweight+identity+governance&amp;p=2&amp;podcast%5fp=t&amp;https="/>
        <item>
            <enclosure url="http://videos.elimity.com/64968568/102142567/d92c0f224b4afb06bffe976a9067f55d/video_medium/data-driven-iam-start-your-iga-video.mp4?source=podcast" type="video/mp4" length="5337257"/>
            <title>[Data-Driven IAM] Start Your IGA Journey</title>
            <link>http://videos.elimity.com/data-driven-iam-start-your-iga</link>
            <description>&lt;p&gt;Identity and access management (IAM) presents a complex challenge in the digital era.&lt;/p&gt;
&lt;p&gt;Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.&lt;/p&gt;
&lt;p&gt;For companies at the start of their IGA journey, this data-driven, risk-driven approach has the potential to let them achieve mature access governance in a matter of days, not months.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/data-driven-iam-start-your-iga"&gt;&lt;img src="http://videos.elimity.com/64968568/102142567/d92c0f224b4afb06bffe976a9067f55d/standard/download-12-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/102142567</guid>
            <pubDate>Mon, 17 Jun 2024 09:23:54 GMT</pubDate>
            <media:title>[Data-Driven IAM] Start Your IGA Journey</media:title>
            <itunes:summary>Identity and access management (IAM) presents a complex challenge in the digital era.
Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.
For companies at the start of their IGA journey, this data-driven, risk-driven approach has the potential to let them achieve mature access governance in a matter of days, not months.</itunes:summary>
            <itunes:subtitle>Identity and access management (IAM) presents a complex challenge in the digital era.
Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2,...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>02:32</itunes:duration>
            <media:description type="html">&lt;p&gt;Identity and access management (IAM) presents a complex challenge in the digital era.&lt;/p&gt;
&lt;p&gt;Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.&lt;/p&gt;
&lt;p&gt;For companies at the start of their IGA journey, this data-driven, risk-driven approach has the potential to let them achieve mature access governance in a matter of days, not months.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/data-driven-iam-start-your-iga"&gt;&lt;img src="http://videos.elimity.com/64968568/102142567/d92c0f224b4afb06bffe976a9067f55d/standard/download-12-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=d92c0f224b4afb06bffe976a9067f55d&amp;source=podcast&amp;photo%5fid=102142567" width="625" height="352" type="text/html" medium="video" duration="152" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968568/102142567/d92c0f224b4afb06bffe976a9067f55d/standard/download-12-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968568/102142567/d92c0f224b4afb06bffe976a9067f55d/standard/download-12-thumbnail.jpg/thumbnail.jpg"/>
            <category>Data-Driven IAM</category>
            <category>IAM</category>
            <category>Identity Analytics</category>
            <category>Lightweight Identity Governance</category>
        </item>
    </channel>
</rss>
