<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd">
    <channel>
        <itunes:owner>
            <itunes:name>Elimity</itunes:name>
            <itunes:email>chiel@elimity.com</itunes:email>
        </itunes:owner>
        <title>Elimity</title>
        <link>https://videos.elimity.com</link>
        <description></description>
        <language>en-us</language>
        <generator>Visualplatform</generator>
        <docs>http://blogs.law.harvard.edu/tech/rss</docs>
        <itunes:author>Elimity</itunes:author>
        <itunes:type>episodic</itunes:type>
        <itunes:explicit>no</itunes:explicit>
        <itunes:image href="https://videos.elimity.com/files/rv0.0/sitelogo.gif"/>
        <image>
            <url>https://videos.elimity.com/files/rv0.0/sitelogo.gif</url>
            <title>Elimity</title>
            <link>https://videos.elimity.com</link>
        </image>
        <atom:link rel="self" href="https://videos.elimity.com/rss/tag/Keynote"/>
        <atom:link rel="next" href="https://videos.elimity.com/rss/tag/Keynote?tag=Keynote&amp;p=2&amp;podcast%5fp=f&amp;https="/>
        <item>
            <enclosure url="http://videos.elimity.com/64968569/101971575/8a93d34c57aa8c076aa75e7f3047bcae/video_medium/iam-and-nis-2-5-tips-to-take-video.mp4?source=podcast" type="video/mp4" length="56270749"/>
            <title>IAM and NIS 2: 5 Tips to Take Control of User Access Within Days </title>
            <link>http://videos.elimity.com/iam-and-nis-2-5-tips-to-take</link>
            <description>&lt;p&gt;NIS2 requires you to be in control of all aspects of your cybersecurity. 

With over 90% of attacks exploiting user access, controlling user access has become key to achieving NIS2-compliance.

✅ NIS2 and IAM: The Ins and Outs
✅ 5 Tips how to Control User Access within Days
✅ Customer Cases at industry leaders such as NMBS, Attentia and Federale&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/iam-and-nis-2-5-tips-to-take"&gt;&lt;img src="http://videos.elimity.com/64968569/101971575/8a93d34c57aa8c076aa75e7f3047bcae/standard/download-11-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/101971575</guid>
            <pubDate>Mon, 02 Feb 2026 11:51:12 GMT</pubDate>
            <media:title>IAM and NIS 2: 5 Tips to Take Control of User Access Within Days </media:title>
            <itunes:summary>NIS2 requires you to be in control of all aspects of your cybersecurity. 

With over 90% of attacks exploiting user access, controlling user access has become key to achieving NIS2-compliance.

✅ NIS2 and IAM: The Ins and Outs
✅ 5 Tips how to Control User Access within Days
✅ Customer Cases at industry leaders such as NMBS, Attentia and Federale</itunes:summary>
            <itunes:subtitle>NIS2 requires you to be in control of all aspects of your cybersecurity. 

With over 90% of attacks exploiting user access, controlling user access has become key to achieving NIS2-compliance.

✅ NIS2 and IAM: The Ins and Outs
✅ 5 Tips how to...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>22:21</itunes:duration>
            <media:description type="html">&lt;p&gt;NIS2 requires you to be in control of all aspects of your cybersecurity. 

With over 90% of attacks exploiting user access, controlling user access has become key to achieving NIS2-compliance.

✅ NIS2 and IAM: The Ins and Outs
✅ 5 Tips how to Control User Access within Days
✅ Customer Cases at industry leaders such as NMBS, Attentia and Federale&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/iam-and-nis-2-5-tips-to-take"&gt;&lt;img src="http://videos.elimity.com/64968569/101971575/8a93d34c57aa8c076aa75e7f3047bcae/standard/download-11-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=8a93d34c57aa8c076aa75e7f3047bcae&amp;source=podcast&amp;photo%5fid=101971575" width="625" height="352" type="text/html" medium="video" duration="1341" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968569/101971575/8a93d34c57aa8c076aa75e7f3047bcae/standard/download-11-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968569/101971575/8a93d34c57aa8c076aa75e7f3047bcae/standard/download-11-thumbnail.jpg/thumbnail.jpg"/>
            <category>IAM</category>
            <category>Identity Governance</category>
            <category>Keynote</category>
            <category>NIS2</category>
        </item>
    </channel>
</rss>
