www.scmagazine.com
Open in
urlscan Pro
2606:4700:20::681a:d13
Public Scan
URL:
https://www.scmagazine.com/podcast-segment/the-overlooked-identity-security-risks-of-rpa-alan-radford-esw-295?utm_source=ma...
Submission: On June 30 via manual from US — Scanned from DE
Submission: On June 30 via manual from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Log inRegister Topics Events Podcasts Research Recognition Leadership About CRA ADVERTISEMENT Enterprise Security WeeklySubscribe Identity and access, Emerging technology THE OVERLOOKED IDENTITY SECURITY RISKS OF RPA – ALAN RADFORD – ESW #295 November 3, 2022 Gartner recently reported that the RPA software market will reach $2.9 billion by the end of 2022, up 19.5% from 2021. But, despite Airlines adopting it to help with cancellations and retail for inventory management, we’re not talking about the security risk this tech will cause. Alan Radford, Global IAM Strategist at One Identity discusses the truly devastating impact that can occur when an organization leaves its RPA program vulnerable and without any identity and access protection, why realizing that machines have identities too could save us from dangerous RPA breaches in the future, and steps companies can take to secure their RPA technology as more companies continue to implement it. Full episode and show notes ANNOUNCEMENTS * You can now find us on Instagram! Follow us for highlight reels, giveaway announcements, and more at SecWeekly. GUEST Alan Radford Global IAM Strategist at One Identity Alan Radford, Global IAM Strategist at One Identity, is a business technologist responsible for the PAM field strategy in EMEA for One Identity, with 15 years’ experience in Identity Access Management. Alan is an experienced business owner and subject matter expert in Privileged Access Management and governance and has worked with organizations across the globe facing unique challenges in the IAM space, bringing innovation and thought leadership to successful IAM strategies. HOSTS Adrian Sanabria Director of Product Marketing at Valence Security @sawaba https://valencesecurity.com Katie Teitler Senior Security Strategist at Axonius Tyler Shields Fractional CMO, Cyber Angel Investor and Advisor at 90 Degree Ventures https://www.90degree.vc/ RELATED Managed services GOING PASSWORDLESS: PREPARING YOUR CLIENTS FOR A CREDENTIALS-FREE FUTURE – CHRISTINE OWEN – CFH #24 June 13, 2023 It's been a big year for the passwordless movement, with tech giants Apple, Google and Microsoft supporting the FIDO Alliance's efforts to replace conventional credentials with passkey technology. Still, passwords have long been engrained into people's daily routines, so users may need some convincing to change their behaviors. And likewise, manage... DevOps ELIMINATE SECURITY VULNERABILITIES WITH APP MODERNIZATION AND IDENTITY ORCHESTRATION – ERIC OLDEN – ASW #244 June 12, 2023 Eric Olden, CEO and Co-Founder of Strata Identity, discusses the concept of Identity Orchestration. He covers the evolving identity landscape and how it has evolved to keep pace with modern apps, the challenges encountered during an identity modernization project, how Identity Orchestration helps those modernization projects, and best practices for... Managed services MANAGED IAM: THE QUEST FOR AN EVOLVED IDENTITY EXPERIENCE – BILL BRENNER – CFH #23 May 30, 2023 Today marks the beginning of the Identiverse conference in Las Vegas, where leaders in security gather to discuss advancements in the world of identity and access management. For MSSPs that specialize in managed IAM services, it's important to stay on top of the latest trends, including those revealed in a series of reports and articles that CyberR... ADVERTISEMENT ADVERTISEMENT ADVERTISEMENT X -------------------------------------------------------------------------------- ABOUT US SC MediaCyberRisk AllianceContact UsCareersPrivacy GET INVOLVED SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us EXPLORE Product reviewsResearchWhite papersWebcastsPodcasts Copyright © 2023 CyberRisk Alliance, LLC All Rights Reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization. Your use of this website constitutes acceptance of CyberRisk Alliance Privacy Policy and Terms & Conditions. COOKIES This website uses cookies to improve your experience, provide social media features and deliver advertising offers that are relevant to you. If you continue without changing your settings, you consent to our use of cookies in accordance with our privacy policy. You may disable cookies. Accept cookies