www.scmagazine.com Open in urlscan Pro
2606:4700:20::681a:d13  Public Scan

URL: https://www.scmagazine.com/podcast-segment/the-overlooked-identity-security-risks-of-rpa-alan-radford-esw-295?utm_source=ma...
Submission: On June 30 via manual from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Log inRegister
Topics
Events
Podcasts
Research
Recognition
Leadership
About CRA



ADVERTISEMENT




Enterprise Security WeeklySubscribe
Identity and access, Emerging technology


THE OVERLOOKED IDENTITY SECURITY RISKS OF RPA – ALAN RADFORD – ESW #295

November 3, 2022


Gartner recently reported that the RPA software market will reach $2.9 billion
by the end of 2022, up 19.5% from 2021. But, despite Airlines adopting it to
help with cancellations and retail for inventory management, we’re not talking
about the security risk this tech will cause. Alan Radford, Global IAM
Strategist at One Identity discusses the truly devastating impact that can occur
when an organization leaves its RPA program vulnerable and without any identity
and access protection, why realizing that machines have identities too could
save us from dangerous RPA breaches in the future, and steps companies can take
to secure their RPA technology as more companies continue to implement it.



Full episode and show notes

ANNOUNCEMENTS

 * You can now find us on Instagram! Follow us for highlight reels, giveaway
   announcements, and more at SecWeekly.

GUEST

Alan Radford
Global IAM Strategist at One Identity


Alan Radford, Global IAM Strategist at One Identity, is a business technologist
responsible for the PAM field strategy in EMEA for One Identity, with 15 years’
experience in Identity Access Management. Alan is an experienced business owner
and subject matter expert in Privileged Access Management and governance and has
worked with organizations across the globe facing unique challenges in the IAM
space, bringing innovation and thought leadership to successful IAM strategies.

HOSTS

Adrian Sanabria
Director of Product Marketing at Valence Security
@sawaba
https://valencesecurity.com
Katie Teitler
Senior Security Strategist at Axonius

Tyler Shields
Fractional CMO, Cyber Angel Investor and Advisor at 90 Degree Ventures
https://www.90degree.vc/


RELATED

Managed services

GOING PASSWORDLESS: PREPARING YOUR CLIENTS FOR A CREDENTIALS-FREE FUTURE –
CHRISTINE OWEN – CFH #24

June 13, 2023

It's been a big year for the passwordless movement, with tech giants Apple,
Google and Microsoft supporting the FIDO Alliance's efforts to replace
conventional credentials with passkey technology. Still, passwords have long
been engrained into people's daily routines, so users may need some convincing
to change their behaviors. And likewise, manage...
DevOps

ELIMINATE SECURITY VULNERABILITIES WITH APP MODERNIZATION AND IDENTITY
ORCHESTRATION – ERIC OLDEN – ASW #244

June 12, 2023

Eric Olden, CEO and Co-Founder of Strata Identity, discusses the concept of
Identity Orchestration. He covers the evolving identity landscape and how it has
evolved to keep pace with modern apps, the challenges encountered during an
identity modernization project, how Identity Orchestration helps those
modernization projects, and best practices for...
Managed services

MANAGED IAM: THE QUEST FOR AN EVOLVED IDENTITY EXPERIENCE – BILL BRENNER – CFH
#23

May 30, 2023

Today marks the beginning of the Identiverse conference in Las Vegas, where
leaders in security gather to discuss advancements in the world of identity and
access management. For MSSPs that specialize in managed IAM services, it's
important to stay on top of the latest trends, including those revealed in a
series of reports and articles that CyberR...

ADVERTISEMENT



ADVERTISEMENT



ADVERTISEMENT



X



--------------------------------------------------------------------------------

ABOUT US

SC MediaCyberRisk AllianceContact UsCareersPrivacy

GET INVOLVED

SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us

EXPLORE

Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2023 CyberRisk Alliance, LLC All Rights Reserved. This material may
not be published, broadcast, rewritten or redistributed in any form without
prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy
Policy and Terms & Conditions.

COOKIES

This website uses cookies to improve your experience, provide social media
features and deliver advertising offers that are relevant to you.

If you continue without changing your settings, you consent to our use of
cookies in accordance with our privacy policy. You may disable cookies.

Accept cookies