Facebook Twitter Instagram YouTube LinkedIn
    Facebook Twitter Instagram LinkedIn YouTube
    Trending
    • Why is it Safer to Use a Prebuilt Platform for your Website?
    • Overcoming Barriers to the Metaverse Requires Ubiquitous Connectivity
    • 10 Strategies to Stop Ransomware Attacks
    • Rajiv Kulkarni Talks about the Malware Analysis Pipeline
    • IDS Alliance Raises Awareness of IAM Fundamentals with the ‘CISO Chronicles’
    • Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases
    • BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles
    • Security Automation Cuts Down Expenses and Saves Time for IT Teams
    TechSpective
    • RSS
    • Facebook
    • Twitter
    • Google+
    • LinkedIn
    • Instagram
    • Pinterest
    • Technology
      Featured
      March 1, 20216

      Could Home Study Be Better for Education? Using Technology to Craft a Better Tomorrow

      Recent
      May 27, 2022

      Overcoming Barriers to the Metaverse Requires Ubiquitous Connectivity

      May 20, 2022

      Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases

      May 20, 2022

      BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles

    • Reviews
      Featured
      March 4, 20211

      Dell’s UltraSharp 40 – Improving Work and Workplaces with Monitor Innovations

      Recent
      April 7, 2022

      Dell’s Latitude 5430 Rugged – Redefining the Extremes of Mobile Computing

      October 12, 2021

      Innovating Home Video Conferencing: Dell’s New 27 Video Conferencing Monitor – S2722DZ

      September 22, 2021

      Review: Intrusion Shield

    • Podcasts
    • Security
      Featured
      March 7, 20212

      Pandemic Unmasks Vulnerability to Automated Bot Attacks

      Recent
      May 26, 2022

      10 Strategies to Stop Ransomware Attacks

      May 25, 2022

      Rajiv Kulkarni Talks about the Malware Analysis Pipeline

      May 23, 2022

      IDS Alliance Raises Awareness of IAM Fundamentals with the ‘CISO Chronicles’

    • Microsoft
      Featured
      September 12, 20201

      The Microsoft Surface Duo: The Communications Device for Those That Think Different

      Recent
      April 8, 2022

      AI and Why Windows 12 Could Be a Far Bigger Advance than Windows 95 Was

      October 11, 2021

      The Surface Laptop Studio: Building a Windows 11 Targeted Laptop

      August 28, 2021

      Why Microsoft’s Hardware Baseline for Windows 11 Is Important

    • News & Analysis
      Featured
      March 6, 20212

      Fixing The World One Person At A Time: Cisco Networking Academy

      Recent
      May 25, 2022

      Rajiv Kulkarni Talks about the Malware Analysis Pipeline

      May 20, 2022

      BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles

      May 20, 2022

      IBM Think 2022 – Embracing the Present, Preparing for the Future

    • Business
      Featured
      March 6, 20212

      Fixing The World One Person At A Time: Cisco Networking Academy

      Recent
      May 27, 2022

      Why is it Safer to Use a Prebuilt Platform for your Website?

      May 20, 2022

      Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases

      May 20, 2022

      Security Automation Cuts Down Expenses and Saves Time for IT Teams

    TechSpective
    You are at:Home»Security»Authentication»Julie Smith Chats about Identity Management Day
    TechSpective Podcast Julie Smith Identity Defined Security Alliance IDSA Identity Management Day

    Julie Smith Chats about Identity Management Day

    1
    By Tony Bradley on April 7, 2022 Authentication, Identity Theft, Podcasts
    https://media.blubrry.com/podcasts_techspective/p/techspective.net/wp-content/uploads/2022/04/20220404_JulieSmith.mp3

    Podcast: Play in new window | Download

    Subscribe: Google Podcasts | Stitcher | RSS

    TechSpective Podcast Episode 088

    What have you got going on next Tuesday? Identity Management Day is coming up on April 12.

    Identity Management Day is a one-day virtual conference that brings together security leaders, vendors, and advocates to raise awareness, share best practices, and inspire individuals —and organizations of all sizes—to take action when it comes to effectively managing and securing digital identities. You will be able to visit with exhibitors in the virtual expo starting at 10am Eastern. The sessions will start at 11am Eastern with awards announcements and a keynote panel. 

    “The biggest problem with identity management today is how horrifically it has been mismanaged and allowed to repeatedly fail and collapse under its own weight,” declared Tom Jermoluk, CEO and Co-Founder of Beyond Identity, in a comment on the importance of Identity Management Day. “For businesses, it’s a ‘last-mile’ problem that ultimately provides bad guys with a ‘first-mile’ on-ramp. While mechanisms to ensure trust between businesses have grown stronger, we’ve added only complexity, burden, and blame on end-users. By persisting with decrepit user identity foundations – which enable everything from account takeover to ransomware – we as an industry are becoming dangerously close to complicit in cybercrime.”

    Julie Smith, Executive Director of the Identity Defined Security Alliance, is my guest for this episode of the TechSpective Podcast. Julie is responsible for executing the mission on behalf of IDSA members and serving the identity and security community. Throughout her career, she has held various leadership roles in technology and solutions companies, including product management, product and solutions marketing, and business development. Prior to joining the IDSA, Julie spent 14 years in the identity and security industry with leading vendors and solution providers–so she brings a wealth of knowledge and experience on the topic.

    Check out the IDSA website for tons of resources and best practices to help improve your identity security. You can also register to attend Identity Management Day.

    Check out the full episode for more insights on the role identity often plays in successful cyberattacks, and why identity security is crucial for effective cybersecurity. We also digress to talk about why May looks like a great month to consider actually going to see a movie in an actual theater.

    The podcast itself is audio-only, but the video of our conversation is also available on YouTube if you prefer:

    Please ask questions and share your thoughts on the topic in the comments below. Also, please subscribe to the TechSpective Podcast through your favorite podcast platform and share the podcast with your peers and friends.

    If you enjoy the podcast, I would also be grateful if you could take 2 minutes to rate and review the podcast on iTunes or wherever you listen.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleWhat Funcom’s Recent Update Means for Conan Exiles Players
    Next Article How To Create an Effective Revenue Marketing Strategy
    Tony Bradley
    • Website
    • Facebook
    • Twitter
    • LinkedIn

    I have a passion for technology and gadgets--with a focus on Microsoft and security--and a desire to help others understand how technology can affect or improve their lives. I also love spending time with my wife, 7 kids, 2 dogs, 5 cats, 1 rabbit, 2 ferrets, a pot-bellied pig, and sulcata tortoise, and I like to think I enjoy reading and golf even though I never find time for either. You can contact me directly at tony@xpective.net. For more from me, you can follow me on Twitter, Facebook, Instagram and LinkedIn.

    Related Posts

    Rajiv Kulkarni Talks about the Malware Analysis Pipeline

    IDS Alliance Raises Awareness of IAM Fundamentals with the ‘CISO Chronicles’

    Digital Identities Power All Your Daily Interactions: Here’s How Identity and Access Management Works for You

    1 Comment

    1. Pingback: Julie Smith Chats about Identity Management Day - F1TYM1

    Leave A Reply Cancel Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.

    Site Sponsors
    Intel
    DevOps.com
    Adobe
    PopSpective
    • Technology
    • Popular
    • Top Reviews
    May 27, 2022

    Overcoming Barriers to the Metaverse Requires Ubiquitous Connectivity

    May 20, 2022

    Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases

    May 20, 2022

    BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles

    9.0
    July 14, 2016

    Review: Lenovo Yoga 900S

    9.5
    March 2, 2015

    Review: Asus Zenbook UX305 ultrabook

    8.0
    February 9, 2015

    Review: Burg 12 smartwatch

    9.7
    November 16, 2018

    Review: BlackVue DR900S-2CH Vehicle Dash Cam

    9.5
    September 2, 2015

    Review: Microsoft Band

    May 27, 2014

    Protect your family photos with ScanMyPhotos

    Adobe
    Popular Posts
    9.0
    July 14, 2016

    Review: Lenovo Yoga 900S

    9.5
    March 2, 2015

    Review: Asus Zenbook UX305 ultrabook

    8.0
    February 9, 2015

    Review: Burg 12 smartwatch

    Coffee and Politics
    Coffee and Politics
    Adobe
    • RSS
    • Facebook
    • Twitter
    • Google+
    • LinkedIn
    • Instagram
    • Pinterest
    About

    TechSpective covers technology trends and breaking news in a meaningful way that brings value to the story, and provides you with information that is relevant to you. We offer in-depth reporting and long-form feature stories, as well as breaking news coverage, product reviews, and community content in plain English terms, and with a unique perspective on technology.

    Adobe

    © 2020 Xpective, Inc.

    • About
    • Privacy
    • Advertise
    • Subscribe
    • Contact
    © 2021 Xpective, Inc.
    • About
    • Privacy
    • Advertise
    • Subscribe
    • Contact

    Type above and press Enter to search. Press Esc to cancel.