5 episodes

Identity and Access Management (IAM) is a foundational component within any cybersecurity program. It’s also a fundamental means by which employees, customers and business partners interact with clients in the digital age.

This podcast series features our EY practitioners discussing many IAM topics. Our aim is to share insights and innovative ideas through real-life conversations. We hope this will help you shape your IAM program for not only today’s but also tomorrow's business needs.

EY NextGen IAM EY Cybersecurity

    • Technology

Identity and Access Management (IAM) is a foundational component within any cybersecurity program. It’s also a fundamental means by which employees, customers and business partners interact with clients in the digital age.

This podcast series features our EY practitioners discussing many IAM topics. Our aim is to share insights and innovative ideas through real-life conversations. We hope this will help you shape your IAM program for not only today’s but also tomorrow's business needs.

    Zero Trust: Lessons learned and real-world perspectives from CrowdStrike and EY

    Zero Trust: Lessons learned and real-world perspectives from CrowdStrike and EY

    The concept of Zero Trust has been around for the past decade with varying degrees of adoption. During this podcast, Ajit, Ankan, and Michael discuss the shift from perimeter defense mindset to assumed breach. Our speakers discuss common pitfalls and enablers across the six pillars of Zero Trust: Identity, Data, Application, Network, Devices and Infrastructure. This episode also explores the different elements across people, process, technology and culture needed for a Zero Trust journey.

    • 19 min
    Decentralized IDs: How blockchain enables a better user experience and a “create-once-use-anywhere” identity

    Decentralized IDs: How blockchain enables a better user experience and a “create-once-use-anywhere” identity

    We use our identity each day, and often more times than we realize. We use our identity to shop online, submit tax returns and even logon for a day’s work. Each of these require a separate identity and the need to remember passwords, and a separate registration process.
    What if we could merge these and have a shared ID instead of having different credentials? The good news is that blockchain has enabled a new way to solve this problem through constructs like verifiable credentials (VCs) and the ability to orchestrate identity verification across the network. In this episode, David Chan, Ernst & Young LLP, speaks with Ankur Patel, Microsoft – Identity Products Lead and Rob Foster, Ernst & Young LLP, about how DIDs (decentralized identities) can improve the user experience and streamline identity management processes.

    • 21 min
    Secrets management – reduce risk, enable the business and effectively manage compliance in an ephemeral world

    Secrets management – reduce risk, enable the business and effectively manage compliance in an ephemeral world

    Secrets are a company’s “keys to the kingdom.” This is especially true as companies increase their footprint in the cloud environment. In fact, many of the top data breaches can be ascribed to the lack of secrets management. Traditional IAM tools may also no longer be enough to manage secrets especially in a cloud environment where resources are ephemeral. When thinking about the type of solution you want to implement among secrets management, some initial questions you need to ask are – what business problem are you trying to solve and how does it align with your broader IT and business objectives?  
    Host David Chan, Ernst & Young LLP Cyber IAM Managing Director, is joined by our guest Ayo Ewebiyi, Ernst & Young LLP Cyber IAM Senior Manager, and one of our key technical leaders in the space, to help us think through the problem and to discuss real-world lessons learned on the topic. 

    • 15 min
    Cloud Access Governance: a conversation with Gap Inc.

    Cloud Access Governance: a conversation with Gap Inc.

    Join us in a discussion around cloud access governance and Gap, Inc.’s multi-cloud identity and access management (IAM) journey. We speak about its challenges and how to leverage tools such as cloud infrastructure entitlement management. Hosted by David Chan, Ernst & Young LLP managing director, and guests Ankan Sharma, Ernst & Young LLP senior manager, and Sriram Santhanam, Gap, Inc. director of IAM.

    • 18 min
    Passwordless Authentication

    Passwordless Authentication

    Each employee password reset costs an average of $70. How many times have you reset your password this year? The number of passwords we're managing continues to grow as our digital identities become more complex, so how do we keep our credentials secure? Today we're talking about the pathway to the future - passwordless authentication.
    Join our host, Sam Tang, EY's Cyber Chief Identity Architect, guest speakers Rob Foster, EY Cybersecurity Senior Manager and George Muldoon, HYPR Global Alliance Leader and subject matter resource in passwordless authentication in their discussion on common obstacles and cutting-edge solutions when using passwords.

    • 17 min

Top Podcasts In Technology

Acquired
Ben Gilbert and David Rosenthal
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Your Undivided Attention
Tristan Harris and Aza Raskin, The Center for Humane Technology
Lex Fridman Podcast
Lex Fridman
Deep Questions with Cal Newport
Cal Newport
Darknet Diaries
Jack Rhysider