93% of organizations experienced an identity-related breach within the last year. What were they missing? How could they have avoided it? Welcome to "Smells Like Identity Hygiene," the podcast for IT professionals, cybersecurity enthusiasts and anyone looking for a better way to protect their organization's most critical assets from risk. - Stay up-to-date with cybersecurity trends, news and industry best practices - Reduce cyber insurance costs, maintain compliance and prevent revenue loss ...
…
continue reading
On this Month's episode of Smells Like Identity Hygiene, we chat with Lindsay, an IT Security Director who is an expert in mergers and acquisitions.Don't miss out!#IdentityHygiene #TechTalk #CyberSecurity #ProductManagement #DeveloperMindset #dataprotection Curious about how much risk your organizations AD Environment is in? Request your free cyber…
…
continue reading

1
Discovering the World of Modern Application Security
46:07
46:07
Play later
Play later
Lists
Like
Liked
46:07On this Month's episode of Smells Like Identity Hygiene, we chat with Greg Nicastro, Operating Partner, Product and Technology COE at Edison PartnersKey Takeaways:-Security is not a subset of quality. It's a core feature.-You will actually be able to deploy more frequently if you are more secure.-The cloud can provide more robust securityDon't miss…
…
continue reading
On this week's Smells Like Identity Hygiene, we chat with Neil Schneider, Chief Technology & Product Officer at K1X, about bridging the gap between tech, security, and product management.'Key Takeaways:Evolving Developer Mindset: Developers today are more security-conscious than ever, understanding the why behind security measures, not just the wha…
…
continue reading

1
Securing Your Identities with Alexis Ierardi
32:11
32:11
Play later
Play later
Lists
Like
Liked
32:11In this episode of Smells Like Identity Hygiene, host Rosario is joined by Alexis Ierardi. Alexis is an Enterprise Account Executive for CyberArk. Alexis has been with CyberArk for over eight years and is has a wealth of knowledge.In this episode we focus the discussion on securing all types of identities from humans, to machines and applications.C…
…
continue reading
In this episode of Smells Like Identity Hygiene, host Rosario is joined by Tim Bowen. Tim is a cyber security expert, product owner, and self proclaimed data nerd.In this episode we discuss what role data plays in modern cyber security programs.Curious about how much risk your organizations AD Environment is in? Request your free cyber risk assessm…
…
continue reading

1
AI in Identity Hygiene: Embracing our Robotic Overlords?
30:47
30:47
Play later
Play later
Lists
Like
Liked
30:47In this episode of Smells Like Identity Hygiene, Kathryn Shih joins host Rosario Mastrogiacomo. Kathryn is an Entrepreneur in Residence at Forgepoint Capital, where she helps entrepreneurs develop effective AI strategies. Topics discussed: - AI's impact on cyber security - How AI is helping the bad guys - How AI can help the good guys - What people…
…
continue reading

1
Directory Declutter: The Minimalist's Guide to Group Management
35:14
35:14
Play later
Play later
Lists
Like
Liked
35:14In this episode of Smells Like Identity Hygiene, hosts Katie and Rosario are joined by Fredy Pardo, Field CISO at SPHERE, to delve into the complexities of Active Directory (AD) management. Discover why AD groups are critical for identity hygiene and access management The challenges of nested and standing access The real-world consequences of poor …
…
continue reading

1
Meet Locals in your Server: How Local Accounts Can Cause Devastating Security Issues
32:59
32:59
Play later
Play later
Lists
Like
Liked
32:59Listen now and gain critical insight into the security risks posed by local accounts. This session is crucial for any cybersecurity professional looking to bolster their defenses against subtle yet severe threats lurking within their IT environments. Hidden Threats: Explore the overlooked risks associated with local accounts that are often unseen b…
…
continue reading

1
Join SPHERE in Nashville for our Annual 360 Summit
1:07
1:07
Play later
Play later
Lists
Like
Liked
1:07Are you a current cybersecurity professional at manager level or above working for an enterprise organization? Gain exclusive access to industry leaders such as Marene Alison (former CISO at J&J), Keith Anderson (CISO at JetBlue) and more! Network with industry peers and get the VIP experience, including complimentary lodging at the Gaylord Oprylan…
…
continue reading
In this episode, we’re unpacking a critical, yet often overlooked aspect of cybersecurity—local accounts on servers, databases, and applications. While they may seem harmless tucked away in the corners of your IT infrastructure, these local accounts can actually pose a ticking time bomb of risk, threatening the very integrity of an organization. Jo…
…
continue reading
In this Webinar Session of "Control-Alt-Defeat: Gaming the System of Prioritizing Security Risk," we navigate the treacherous terrain of identity security asset types, controls, and violations with the precision of a grandmaster strategist playing the ultimate game of chess. Our expert host dives into the art and science of turning sprawling data p…
…
continue reading

1
Control-Alt-Defeat: Gaming the System of Prioritizing Security Risk (Audio Only)
27:42
27:42
Play later
Play later
Lists
Like
Liked
27:42We’re diving deep with Neil Hymowitz from Northwell Health into how healthcare organizations can effectively set and prioritize security controls to protect sensitive data. 🏥💻 Don’t miss out—enhance your security strategy by tuning in now! Plus, register for our live webinar on the 25th for a deeper dive into today’s topics. https://insights.spher…
…
continue reading

1
Control-Alt-Defeat: Gaming the System of Prioritizing Security Risk
27:42
27:42
Play later
Play later
Lists
Like
Liked
27:42We’re diving deep with Neil Hymowitz from Northwell Health into how healthcare organizations can effectively set and prioritize security controls to protect sensitive data. 🏥💻 Don’t miss out—enhance your security strategy by tuning in now! Plus, register for our live webinar on the 25th for a deeper dive into today’s topics. https://insights.sphere…
…
continue reading

1
Webinar: Identity Hygiene Live! "Identify Your Identities: Bob Smith is not BSmith"
28:16
28:16
Play later
Play later
Lists
Like
Liked
28:16March 2024Today, March 21st at 2:00pm ETIn today's session of Identity Hygiene Live, where we take a deeper dive into Identity and how it directly impacts your organization's risk posture. Don't miss out on these insights
…
continue reading

1
Identify Your Identities: Bob Smith is not BSmith
25:31
25:31
Play later
Play later
Lists
Like
Liked
25:31In any size organization, identifying individuals and their digital personas—like "Bob Smith" and "bsmith," which could be a CEO or a mailroom clerk, a user account, or an email alias—is crucial. The complexity of metadata demands we differentiate the actual from the digital for security purposes. After all, while "Bob Smith" might be working at hi…
…
continue reading

1
Identify Your Identities: Bob Smith is not BSmith (Audio Only)
25:30
25:30
Play later
Play later
Lists
Like
Liked
25:30In any size organization, identifying individuals and their digital personas—like "Bob Smith" and "bsmith," which could be a CEO or a mailroom clerk, a user account, or an email alias—is crucial. The complexity of metadata demands we differentiate the actual from the digital for security purposes. After all, while "Bob Smith" might be working at hi…
…
continue reading

1
The Risk Paradox: Reducing Security Risk can come at the cost of Operational Risk
27:25
27:25
Play later
Play later
Lists
Like
Liked
27:25Welcome to "The Risk Paradox," where we tackle a tricky question: can making things safer ever actually slow us down? In this episode, we're chatting about that fine line between being secure and being stuck, and how to walk it like a pro. Tune in as we unpack the secrets to leverage ownership and keep things running smoothly without leaving the ba…
…
continue reading

1
Intelligent Discovery: You Can't Protect What You Don't Know
30:41
30:41
Play later
Play later
Lists
Like
Liked
30:41Join us as we dive into why it is important to discover all of your organization's accounts, groups, and data to reduce overall cyber risk. We provide insight into the difference between discovery and intelligent discovery and how to achieve Identity Hygiene to gain comprehensive visibility across your environment. *Stick around for outtakes and bl…
…
continue reading