<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd">
    <channel>
        <itunes:owner>
            <itunes:name>Elimity</itunes:name>
            <itunes:email>chiel@elimity.com</itunes:email>
        </itunes:owner>
        <title>Elimity</title>
        <link>https://videos.elimity.com</link>
        <description></description>
        <language>en-us</language>
        <generator>Visualplatform</generator>
        <docs>http://blogs.law.harvard.edu/tech/rss</docs>
        <itunes:author>Elimity</itunes:author>
        <itunes:type>episodic</itunes:type>
        <itunes:explicit>no</itunes:explicit>
        <itunes:image href="https://videos.elimity.com/files/rv0.0/sitelogo.gif"/>
        <image>
            <url>https://videos.elimity.com/files/rv0.0/sitelogo.gif</url>
            <title>Elimity</title>
            <link>https://videos.elimity.com</link>
        </image>
        <atom:link rel="self" href="https://videos.elimity.com/rss/tag/ SOC2"/>
        <atom:link rel="next" href="https://videos.elimity.com/rss/tag/ SOC2?tag=+SOC2&amp;p=2&amp;podcast%5fp=f&amp;https="/>
        <item>
            <enclosure url="http://videos.elimity.com/64968568/102142572/1f52db3930a592edce2689be8c554683/video_medium/idata-driven-iam-identity-video.mp4?source=podcast" type="video/mp4" length="2975062"/>
            <title>[IData-Driven IAM ] Identity Analytics on Top of your IGA</title>
            <link>http://videos.elimity.com/idata-driven-iam-identity</link>
            <description>&lt;p&gt;At Indigo Consulting and Elimity, we see identity data challenges at companies with very large IAM teams and mature IGA deployments.&lt;/p&gt;
&lt;p&gt;In that case, even though they already have an IGA solution that manages the user lifecycle - JML -  for many applications, the teams still lack the identity visibility.&lt;/p&gt;
&lt;p&gt;And when we say teams, for these large organizations it means Auditors, Security teams, Business IT, Application owners, and so on. As a result of that, lots of time is still wasted on generating and waiting for IAM reports - and lot’s of critical data gaps are never accounted for.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/idata-driven-iam-identity"&gt;&lt;img src="http://videos.elimity.com/64968568/102142572/1f52db3930a592edce2689be8c554683/standard/download-14-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/102142572</guid>
            <pubDate>Mon, 17 Jun 2024 09:23:54 GMT</pubDate>
            <media:title>[IData-Driven IAM ] Identity Analytics on Top of your IGA</media:title>
            <itunes:summary>At Indigo Consulting and Elimity, we see identity data challenges at companies with very large IAM teams and mature IGA deployments.
In that case, even though they already have an IGA solution that manages the user lifecycle - JML -  for many applications, the teams still lack the identity visibility.
And when we say teams, for these large organizations it means Auditors, Security teams, Business IT, Application owners, and so on. As a result of that, lots of time is still wasted on generating and waiting for IAM reports - and lot’s of critical data gaps are never accounted for.</itunes:summary>
            <itunes:subtitle>At Indigo Consulting and Elimity, we see identity data challenges at companies with very large IAM teams and mature IGA deployments.
In that case, even though they already have an IGA solution that manages the user lifecycle - JML -  for many...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:24</itunes:duration>
            <media:description type="html">&lt;p&gt;At Indigo Consulting and Elimity, we see identity data challenges at companies with very large IAM teams and mature IGA deployments.&lt;/p&gt;
&lt;p&gt;In that case, even though they already have an IGA solution that manages the user lifecycle - JML -  for many applications, the teams still lack the identity visibility.&lt;/p&gt;
&lt;p&gt;And when we say teams, for these large organizations it means Auditors, Security teams, Business IT, Application owners, and so on. As a result of that, lots of time is still wasted on generating and waiting for IAM reports - and lot’s of critical data gaps are never accounted for.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/idata-driven-iam-identity"&gt;&lt;img src="http://videos.elimity.com/64968568/102142572/1f52db3930a592edce2689be8c554683/standard/download-14-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=1f52db3930a592edce2689be8c554683&amp;source=podcast&amp;photo%5fid=102142572" width="625" height="352" type="text/html" medium="video" duration="84" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968568/102142572/1f52db3930a592edce2689be8c554683/standard/download-14-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968568/102142572/1f52db3930a592edce2689be8c554683/standard/download-14-thumbnail.jpg/thumbnail.jpg"/>
            <category> CMMC etc.   However</category>
            <category>Data-Driven IAM</category>
            <category> especially with regulations such as NIS2</category>
            <category>IAM</category>
            <category>Identity Analytics</category>
            <category>IGA</category>
            <category> in practice we see a number of recurring challenges: identity sprawl: there is an exponential growth of identities and access rights in many organization due to cloud</category>
            <category> ISO27001</category>
            <category> IT and other technologies</category>
            <category> resulting into escalating costs  Resource scarcity: all while IAM resources and expertise are becoming more scarce.</category>
            <category> siloed information: these identities are spread across many individual environments</category>
            <category> SOC2</category>
            <category>The reason that we chose this topic is that securing access to data and applications has become a cornerstone of any modern cybersecurity strategy</category>
        </item>
    </channel>
</rss>
