<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd">
    <channel>
        <itunes:owner>
            <itunes:name>Elimity</itunes:name>
            <itunes:email>chiel@elimity.com</itunes:email>
        </itunes:owner>
        <title>Elimity</title>
        <link>https://videos.elimity.com</link>
        <description></description>
        <language>en-us</language>
        <generator>Visualplatform</generator>
        <docs>http://blogs.law.harvard.edu/tech/rss</docs>
        <itunes:author>Elimity</itunes:author>
        <itunes:type>episodic</itunes:type>
        <itunes:explicit>no</itunes:explicit>
        <itunes:image href="https://videos.elimity.com/files/rv0.0/sitelogo.gif"/>
        <image>
            <url>https://videos.elimity.com/files/rv0.0/sitelogo.gif</url>
            <title>Elimity</title>
            <link>https://videos.elimity.com</link>
        </image>
        <atom:link rel="self" href="https://videos.elimity.com/rss/tag/IAM"/>
        <atom:link rel="next" href="https://videos.elimity.com/rss/tag/IAM?tag=IAM&amp;p=2&amp;podcast%5fp=f&amp;https="/>
        <item>
            <enclosure url="http://videos.elimity.com/64968569/101971575/8a93d34c57aa8c076aa75e7f3047bcae/video_medium/iam-and-nis-2-5-tips-to-take-video.mp4?source=podcast" type="video/mp4" length="56270749"/>
            <title>IAM and NIS 2: 5 Tips to Take Control of User Access Within Days </title>
            <link>http://videos.elimity.com/iam-and-nis-2-5-tips-to-take</link>
            <description>&lt;p&gt;NIS2 requires you to be in control of all aspects of your cybersecurity. 

With over 90% of attacks exploiting user access, controlling user access has become key to achieving NIS2-compliance.

✅ NIS2 and IAM: The Ins and Outs
✅ 5 Tips how to Control User Access within Days
✅ Customer Cases at industry leaders such as NMBS, Attentia and Federale&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/iam-and-nis-2-5-tips-to-take"&gt;&lt;img src="http://videos.elimity.com/64968569/101971575/8a93d34c57aa8c076aa75e7f3047bcae/standard/download-11-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/101971575</guid>
            <pubDate>Mon, 02 Feb 2026 11:51:12 GMT</pubDate>
            <media:title>IAM and NIS 2: 5 Tips to Take Control of User Access Within Days </media:title>
            <itunes:summary>NIS2 requires you to be in control of all aspects of your cybersecurity. 

With over 90% of attacks exploiting user access, controlling user access has become key to achieving NIS2-compliance.

✅ NIS2 and IAM: The Ins and Outs
✅ 5 Tips how to Control User Access within Days
✅ Customer Cases at industry leaders such as NMBS, Attentia and Federale</itunes:summary>
            <itunes:subtitle>NIS2 requires you to be in control of all aspects of your cybersecurity. 

With over 90% of attacks exploiting user access, controlling user access has become key to achieving NIS2-compliance.

✅ NIS2 and IAM: The Ins and Outs
✅ 5 Tips how to...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>22:21</itunes:duration>
            <media:description type="html">&lt;p&gt;NIS2 requires you to be in control of all aspects of your cybersecurity. 

With over 90% of attacks exploiting user access, controlling user access has become key to achieving NIS2-compliance.

✅ NIS2 and IAM: The Ins and Outs
✅ 5 Tips how to Control User Access within Days
✅ Customer Cases at industry leaders such as NMBS, Attentia and Federale&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/iam-and-nis-2-5-tips-to-take"&gt;&lt;img src="http://videos.elimity.com/64968569/101971575/8a93d34c57aa8c076aa75e7f3047bcae/standard/download-11-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=8a93d34c57aa8c076aa75e7f3047bcae&amp;source=podcast&amp;photo%5fid=101971575" width="625" height="352" type="text/html" medium="video" duration="1341" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968569/101971575/8a93d34c57aa8c076aa75e7f3047bcae/standard/download-11-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968569/101971575/8a93d34c57aa8c076aa75e7f3047bcae/standard/download-11-thumbnail.jpg/thumbnail.jpg"/>
            <category>IAM</category>
            <category>Identity Governance</category>
            <category>Keynote</category>
            <category>NIS2</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968575/102468999/aa667fda2ac2d70206361b5c0a9df86a/video_medium/nis2-sectors-v2-video.mp4?source=podcast" type="video/mp4" length="3631946"/>
            <title>NIS2: Sectors (V2)</title>
            <link>http://videos.elimity.com/nis2-sectors-v2</link>
            <description>&lt;p&gt;&lt;p&gt;NIS2 requires you to be in control of all aspects of your cybersecurity.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;With over 90% of attacks exploiting user access, controlling user access has become key to achieving #NIS2 compliance.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;&lt;/p&gt;
&lt;p&gt;✅ NIS2: Key Changes and Implications&lt;/p&gt;
&lt;p&gt;✅ NIS2 &amp;amp; IAM: Requirements Governance and Reporting&lt;/p&gt;
&lt;p&gt;✅ Case Study: Achieving NIS2 Compliance with Limited Resources&lt;/p&gt;
&lt;p&gt;✅ Solution: Lightweight Identity Governance&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/nis2-sectors-v2"&gt;&lt;img src="http://videos.elimity.com/64968575/102468999/aa667fda2ac2d70206361b5c0a9df86a/standard/download-15-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/102468999</guid>
            <pubDate>Thu, 27 Jun 2024 08:04:20 GMT</pubDate>
            <media:title>NIS2: Sectors (V2)</media:title>
            <itunes:summary>NIS2 requires you to be in control of all aspects of your cybersecurity.

With over 90% of attacks exploiting user access, controlling user access has become key to achieving #NIS2 compliance.

✅ NIS2: Key Changes and Implications
✅ NIS2  IAM: Requirements Governance and Reporting
✅ Case Study: Achieving NIS2 Compliance with Limited Resources
✅ Solution: Lightweight Identity Governance
</itunes:summary>
            <itunes:subtitle>NIS2 requires you to be in control of all aspects of your cybersecurity.

With over 90% of attacks exploiting user access, controlling user access has become key to achieving #NIS2 compliance.

✅ NIS2: Key Changes and Implications
✅ NIS2  IAM:...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:21</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;p&gt;NIS2 requires you to be in control of all aspects of your cybersecurity.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;With over 90% of attacks exploiting user access, controlling user access has become key to achieving #NIS2 compliance.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;&lt;/p&gt;
&lt;p&gt;✅ NIS2: Key Changes and Implications&lt;/p&gt;
&lt;p&gt;✅ NIS2 &amp;amp; IAM: Requirements Governance and Reporting&lt;/p&gt;
&lt;p&gt;✅ Case Study: Achieving NIS2 Compliance with Limited Resources&lt;/p&gt;
&lt;p&gt;✅ Solution: Lightweight Identity Governance&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/nis2-sectors-v2"&gt;&lt;img src="http://videos.elimity.com/64968575/102468999/aa667fda2ac2d70206361b5c0a9df86a/standard/download-15-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=aa667fda2ac2d70206361b5c0a9df86a&amp;source=podcast&amp;photo%5fid=102468999" width="625" height="352" type="text/html" medium="video" duration="81" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968575/102468999/aa667fda2ac2d70206361b5c0a9df86a/standard/download-15-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968575/102468999/aa667fda2ac2d70206361b5c0a9df86a/standard/download-15-thumbnail.jpg/thumbnail.jpg"/>
            <category>IAM</category>
            <category>NIS2</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968568/102142574/07e9f6f9460c51f7cf52de274ac71900/video_medium/idata-driven-iam-the-3-main-video.mp4?source=podcast" type="video/mp4" length="4751527"/>
            <title>[IData-Driven IAM ] The 3 Main Challenges</title>
            <link>http://videos.elimity.com/idata-driven-iam-the-3-main</link>
            <description>&lt;p&gt;Identity and access management (IAM) presents a complex challenge in the digital era.&lt;/p&gt;
&lt;p&gt;Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.&lt;/p&gt;
&lt;p&gt;At Elimity and Indigo Consulting, we see a number of recurring challenges:&lt;/p&gt;
&lt;p&gt;1️⃣ Identity sprawl: there is an exponential growth of identities and access rights in many organization due to cloud, IT and other technologies.&lt;/p&gt;
&lt;p&gt;2️⃣ Siloed information: these identities are spread across many individual environments,&lt;br /&gt;
resulting into escalating costs.&lt;/p&gt;
&lt;p&gt;3️⃣ Resource scarcity: all while IAM resources and expertise are becoming more scarce.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/idata-driven-iam-the-3-main"&gt;&lt;img src="http://videos.elimity.com/64968568/102142574/07e9f6f9460c51f7cf52de274ac71900/standard/download-14-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/102142574</guid>
            <pubDate>Mon, 17 Jun 2024 09:23:54 GMT</pubDate>
            <media:title>[IData-Driven IAM ] The 3 Main Challenges</media:title>
            <itunes:summary>Identity and access management (IAM) presents a complex challenge in the digital era.
Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.
At Elimity and Indigo Consulting, we see a number of recurring challenges:
1️⃣ Identity sprawl: there is an exponential growth of identities and access rights in many organization due to cloud, IT and other technologies.
2️⃣ Siloed information: these identities are spread across many individual environments,
resulting into escalating costs.
3️⃣ Resource scarcity: all while IAM resources and expertise are becoming more scarce.</itunes:summary>
            <itunes:subtitle>Identity and access management (IAM) presents a complex challenge in the digital era.
Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2,...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:48</itunes:duration>
            <media:description type="html">&lt;p&gt;Identity and access management (IAM) presents a complex challenge in the digital era.&lt;/p&gt;
&lt;p&gt;Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.&lt;/p&gt;
&lt;p&gt;At Elimity and Indigo Consulting, we see a number of recurring challenges:&lt;/p&gt;
&lt;p&gt;1️⃣ Identity sprawl: there is an exponential growth of identities and access rights in many organization due to cloud, IT and other technologies.&lt;/p&gt;
&lt;p&gt;2️⃣ Siloed information: these identities are spread across many individual environments,&lt;br /&gt;
resulting into escalating costs.&lt;/p&gt;
&lt;p&gt;3️⃣ Resource scarcity: all while IAM resources and expertise are becoming more scarce.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/idata-driven-iam-the-3-main"&gt;&lt;img src="http://videos.elimity.com/64968568/102142574/07e9f6f9460c51f7cf52de274ac71900/standard/download-14-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=07e9f6f9460c51f7cf52de274ac71900&amp;source=podcast&amp;photo%5fid=102142574" width="625" height="352" type="text/html" medium="video" duration="108" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968568/102142574/07e9f6f9460c51f7cf52de274ac71900/standard/download-14-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968568/102142574/07e9f6f9460c51f7cf52de274ac71900/standard/download-14-thumbnail.jpg/thumbnail.jpg"/>
            <category>Data-Driven IAM</category>
            <category>IAM</category>
            <category>Identity Analytics</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968568/102142572/1f52db3930a592edce2689be8c554683/video_medium/idata-driven-iam-identity-video.mp4?source=podcast" type="video/mp4" length="2975062"/>
            <title>[IData-Driven IAM ] Identity Analytics on Top of your IGA</title>
            <link>http://videos.elimity.com/idata-driven-iam-identity</link>
            <description>&lt;p&gt;At Indigo Consulting and Elimity, we see identity data challenges at companies with very large IAM teams and mature IGA deployments.&lt;/p&gt;
&lt;p&gt;In that case, even though they already have an IGA solution that manages the user lifecycle - JML -  for many applications, the teams still lack the identity visibility.&lt;/p&gt;
&lt;p&gt;And when we say teams, for these large organizations it means Auditors, Security teams, Business IT, Application owners, and so on. As a result of that, lots of time is still wasted on generating and waiting for IAM reports - and lot’s of critical data gaps are never accounted for.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/idata-driven-iam-identity"&gt;&lt;img src="http://videos.elimity.com/64968568/102142572/1f52db3930a592edce2689be8c554683/standard/download-14-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/102142572</guid>
            <pubDate>Mon, 17 Jun 2024 09:23:54 GMT</pubDate>
            <media:title>[IData-Driven IAM ] Identity Analytics on Top of your IGA</media:title>
            <itunes:summary>At Indigo Consulting and Elimity, we see identity data challenges at companies with very large IAM teams and mature IGA deployments.
In that case, even though they already have an IGA solution that manages the user lifecycle - JML -  for many applications, the teams still lack the identity visibility.
And when we say teams, for these large organizations it means Auditors, Security teams, Business IT, Application owners, and so on. As a result of that, lots of time is still wasted on generating and waiting for IAM reports - and lot’s of critical data gaps are never accounted for.</itunes:summary>
            <itunes:subtitle>At Indigo Consulting and Elimity, we see identity data challenges at companies with very large IAM teams and mature IGA deployments.
In that case, even though they already have an IGA solution that manages the user lifecycle - JML -  for many...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:24</itunes:duration>
            <media:description type="html">&lt;p&gt;At Indigo Consulting and Elimity, we see identity data challenges at companies with very large IAM teams and mature IGA deployments.&lt;/p&gt;
&lt;p&gt;In that case, even though they already have an IGA solution that manages the user lifecycle - JML -  for many applications, the teams still lack the identity visibility.&lt;/p&gt;
&lt;p&gt;And when we say teams, for these large organizations it means Auditors, Security teams, Business IT, Application owners, and so on. As a result of that, lots of time is still wasted on generating and waiting for IAM reports - and lot’s of critical data gaps are never accounted for.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/idata-driven-iam-identity"&gt;&lt;img src="http://videos.elimity.com/64968568/102142572/1f52db3930a592edce2689be8c554683/standard/download-14-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=1f52db3930a592edce2689be8c554683&amp;source=podcast&amp;photo%5fid=102142572" width="625" height="352" type="text/html" medium="video" duration="84" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968568/102142572/1f52db3930a592edce2689be8c554683/standard/download-14-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968568/102142572/1f52db3930a592edce2689be8c554683/standard/download-14-thumbnail.jpg/thumbnail.jpg"/>
            <category> CMMC etc.   However</category>
            <category>Data-Driven IAM</category>
            <category> especially with regulations such as NIS2</category>
            <category>IAM</category>
            <category>Identity Analytics</category>
            <category>IGA</category>
            <category> in practice we see a number of recurring challenges: identity sprawl: there is an exponential growth of identities and access rights in many organization due to cloud</category>
            <category> ISO27001</category>
            <category> IT and other technologies</category>
            <category> resulting into escalating costs  Resource scarcity: all while IAM resources and expertise are becoming more scarce.</category>
            <category> siloed information: these identities are spread across many individual environments</category>
            <category> SOC2</category>
            <category>The reason that we chose this topic is that securing access to data and applications has become a cornerstone of any modern cybersecurity strategy</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968568/102142570/7a2664fd113d59b21679b2dfd3d687b9/video_medium/data-driven-iam-merger-and-video.mp4?source=podcast" type="video/mp4" length="1816417"/>
            <title>[Data-Driven IAM] Merger and Acquisition</title>
            <link>http://videos.elimity.com/data-driven-iam-merger-and</link>
            <description>&lt;p&gt;Identity and access management (IAM) presents a complex challenge in the digital era.&lt;/p&gt;
&lt;p&gt;Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.&lt;/p&gt;
&lt;p&gt;At Indigo Consulting and Elimity, we see that merging companies struggle to have a streamlined identity and access management process.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/data-driven-iam-merger-and"&gt;&lt;img src="http://videos.elimity.com/64968568/102142570/7a2664fd113d59b21679b2dfd3d687b9/standard/download-13-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/102142570</guid>
            <pubDate>Mon, 17 Jun 2024 09:23:54 GMT</pubDate>
            <media:title>[Data-Driven IAM] Merger and Acquisition</media:title>
            <itunes:summary>Identity and access management (IAM) presents a complex challenge in the digital era.
Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.
At Indigo Consulting and Elimity, we see that merging companies struggle to have a streamlined identity and access management process.</itunes:summary>
            <itunes:subtitle>Identity and access management (IAM) presents a complex challenge in the digital era.
Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2,...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>00:51</itunes:duration>
            <media:description type="html">&lt;p&gt;Identity and access management (IAM) presents a complex challenge in the digital era.&lt;/p&gt;
&lt;p&gt;Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.&lt;/p&gt;
&lt;p&gt;At Indigo Consulting and Elimity, we see that merging companies struggle to have a streamlined identity and access management process.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/data-driven-iam-merger-and"&gt;&lt;img src="http://videos.elimity.com/64968568/102142570/7a2664fd113d59b21679b2dfd3d687b9/standard/download-13-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=7a2664fd113d59b21679b2dfd3d687b9&amp;source=podcast&amp;photo%5fid=102142570" width="625" height="352" type="text/html" medium="video" duration="51" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968568/102142570/7a2664fd113d59b21679b2dfd3d687b9/standard/download-13-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968568/102142570/7a2664fd113d59b21679b2dfd3d687b9/standard/download-13-thumbnail.jpg/thumbnail.jpg"/>
            <category>Data-Driven IAM</category>
            <category>IAM</category>
            <category>Identity Analytics</category>
            <category>IGA</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968568/102142567/d92c0f224b4afb06bffe976a9067f55d/video_medium/data-driven-iam-start-your-iga-video.mp4?source=podcast" type="video/mp4" length="5337257"/>
            <title>[Data-Driven IAM] Start Your IGA Journey</title>
            <link>http://videos.elimity.com/data-driven-iam-start-your-iga</link>
            <description>&lt;p&gt;Identity and access management (IAM) presents a complex challenge in the digital era.&lt;/p&gt;
&lt;p&gt;Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.&lt;/p&gt;
&lt;p&gt;For companies at the start of their IGA journey, this data-driven, risk-driven approach has the potential to let them achieve mature access governance in a matter of days, not months.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/data-driven-iam-start-your-iga"&gt;&lt;img src="http://videos.elimity.com/64968568/102142567/d92c0f224b4afb06bffe976a9067f55d/standard/download-12-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/102142567</guid>
            <pubDate>Mon, 17 Jun 2024 09:23:54 GMT</pubDate>
            <media:title>[Data-Driven IAM] Start Your IGA Journey</media:title>
            <itunes:summary>Identity and access management (IAM) presents a complex challenge in the digital era.
Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.
For companies at the start of their IGA journey, this data-driven, risk-driven approach has the potential to let them achieve mature access governance in a matter of days, not months.</itunes:summary>
            <itunes:subtitle>Identity and access management (IAM) presents a complex challenge in the digital era.
Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2,...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>02:32</itunes:duration>
            <media:description type="html">&lt;p&gt;Identity and access management (IAM) presents a complex challenge in the digital era.&lt;/p&gt;
&lt;p&gt;Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.&lt;/p&gt;
&lt;p&gt;For companies at the start of their IGA journey, this data-driven, risk-driven approach has the potential to let them achieve mature access governance in a matter of days, not months.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/data-driven-iam-start-your-iga"&gt;&lt;img src="http://videos.elimity.com/64968568/102142567/d92c0f224b4afb06bffe976a9067f55d/standard/download-12-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=d92c0f224b4afb06bffe976a9067f55d&amp;source=podcast&amp;photo%5fid=102142567" width="625" height="352" type="text/html" medium="video" duration="152" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968568/102142567/d92c0f224b4afb06bffe976a9067f55d/standard/download-12-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968568/102142567/d92c0f224b4afb06bffe976a9067f55d/standard/download-12-thumbnail.jpg/thumbnail.jpg"/>
            <category>Data-Driven IAM</category>
            <category>IAM</category>
            <category>Identity Analytics</category>
            <category>Lightweight Identity Governance</category>
        </item>
    </channel>
</rss>
