Sphere Identity Hygiene Solutions public
[search 0]
More
Download the App!
show episodes
 
Artwork

1
Smells Like Identity Hygiene

SPHERE - Identity Hygiene Solutions

Unsubscribe
Unsubscribe
Monthly
 
84% of organizations experienced an identity-related breach within the last year. What were they missing? How could they have avoided it? Welcome to "Smells Like Identity Hygiene," the podcast for IT professionals, cybersecurity enthusiasts and anyone looking for a better way to protect their organization's most critical assets from risk. - Stay up-to-date with cybersecurity trends, news and industry best practices - Reduce cyber insurance costs, maintain compliance and prevent revenue loss ...
  continue reading
 
Loading …
show series
 
In this episode of Smells Like Identity Hygiene, hosts Katie and Rosario are joined by Fredy Pardo, Field CISO at SPHERE, to delve into the complexities of Active Directory (AD) management. Discover why AD groups are critical for identity hygiene and access management The challenges of nested and standing access The real-world consequences of poor …
  continue reading
 
Listen now and gain critical insight into the security risks posed by local accounts. This session is crucial for any cybersecurity professional looking to bolster their defenses against subtle yet severe threats lurking within their IT environments. Hidden Threats: Explore the overlooked risks associated with local accounts that are often unseen b…
  continue reading
 
Are you a current cybersecurity professional at manager level or above working for an enterprise organization? Gain exclusive access to industry leaders such as Marene Alison (former CISO at J&J), Keith Anderson (CISO at JetBlue) and more! Network with industry peers and get the VIP experience, including complimentary lodging at the Gaylord Oprylan…
  continue reading
 
In this episode, we’re unpacking a critical, yet often overlooked aspect of cybersecurity—local accounts on servers, databases, and applications. While they may seem harmless tucked away in the corners of your IT infrastructure, these local accounts can actually pose a ticking time bomb of risk, threatening the very integrity of an organization. Jo…
  continue reading
 
In this Webinar Session of "Control-Alt-Defeat: Gaming the System of Prioritizing Security Risk," we navigate the treacherous terrain of identity security asset types, controls, and violations with the precision of a grandmaster strategist playing the ultimate game of chess. Our expert host dives into the art and science of turning sprawling data p…
  continue reading
 
We’re diving deep with Neil Hymowitz from Northwell Health into how healthcare organizations can effectively set and prioritize security controls to protect sensitive data. 🏥💻 Don’t miss out—enhance your security strategy by tuning in now! Plus, register for our live webinar on the 25th for a deeper dive into today’s topics. ⁠https://insights.spher…
  continue reading
 
We’re diving deep with Neil Hymowitz from Northwell Health into how healthcare organizations can effectively set and prioritize security controls to protect sensitive data. 🏥💻 Don’t miss out—enhance your security strategy by tuning in now! Plus, register for our live webinar on the 25th for a deeper dive into today’s topics. https://insights.sphere…
  continue reading
 
In any size organization, identifying individuals and their digital personas—like "Bob Smith" and "bsmith," which could be a CEO or a mailroom clerk, a user account, or an email alias—is crucial. The complexity of metadata demands we differentiate the actual from the digital for security purposes. After all, while "Bob Smith" might be working at hi…
  continue reading
 
In any size organization, identifying individuals and their digital personas—like "Bob Smith" and "bsmith," which could be a CEO or a mailroom clerk, a user account, or an email alias—is crucial. The complexity of metadata demands we differentiate the actual from the digital for security purposes. After all, while "Bob Smith" might be working at hi…
  continue reading
 
Welcome to "The Risk Paradox," where we tackle a tricky question: can making things safer ever actually slow us down? In this episode, we're chatting about that fine line between being secure and being stuck, and how to walk it like a pro. Tune in as we unpack the secrets to leverage ownership and keep things running smoothly without leaving the ba…
  continue reading
 
Join us as we dive into why it is important to discover all of your organization's accounts, groups, and data to reduce overall cyber risk. We provide insight into the difference between discovery and intelligent discovery and how to achieve Identity Hygiene to gain comprehensive visibility across your environment. *Stick around for outtakes and bl…
  continue reading
 
Loading …

Quick Reference Guide