Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
History
Sports
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts126/v4/c2/62/0c/c2620c89-f4ad-f871-f401-aad113b52e3d/mza_886688722484499254.jpg/600x600bb.jpg
The Identity Navigator
Rohit Agnihotri
30 episodes
4 days ago
Welcome to "The Identity Navigator," your compass in the world of Identity and Access Management (IAM). Join us as we navigate the complexities of digital identity, security, and access control. Stay informed with expert insights, industry trends, and practical tips to safeguard your organization's digital assets. Whether you're new to IAM or a seasoned pro, tune in to unlock the strategies that will elevate your security posture. Subscribe to The Identity Navigator podcast and chart your course to secure, efficient IAM solutions.
Show more...
Technology
RSS
All content for The Identity Navigator is the property of Rohit Agnihotri and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Welcome to "The Identity Navigator," your compass in the world of Identity and Access Management (IAM). Join us as we navigate the complexities of digital identity, security, and access control. Stay informed with expert insights, industry trends, and practical tips to safeguard your organization's digital assets. Whether you're new to IAM or a seasoned pro, tune in to unlock the strategies that will elevate your security posture. Subscribe to The Identity Navigator podcast and chart your course to secure, efficient IAM solutions.
Show more...
Technology
Episodes (20/30)
The Identity Navigator
#29 The Evolution of IGA Tools

Identity Governance & Administration didn’t arrive fully formed, it evolved. In this episode we walk through the journey of IGA.

From homegrown scripts and spreadsheets to heavyweight platforms like Sun, Oracle, and CA. The rise of governance-first thinking with SailPoint and Saviynt . How compliance, cloud, and complexity reshaped the market


Email: theIdentityNavigator@gmail.com

LInkedIn: /rohit-agnihotri


Show more...
1 month ago
49 minutes 57 seconds

The Identity Navigator
# 28 Hello, I’m Root: When Entitlement Becomes Ego

Remember when smoking looked cool? For years in tech, holding root access was the same, a badge of honor, proof you were trusted, heroic, untouchable.


In tech, we have our own “smoking”, permanent root/admin access. For years, being the engineer with root was a badge of honor. It felt powerful, even heroic. You were the one who could swoop in and “save the day.” But beneath the surface, this creates real risk. Root access becomes not just a tool but a piece of personal identity. We start to believe that if we lose it, we lose our status.


In this episode we deep dive into the psychology of root access, the shared toothbrush model of access and access detox campaigns.

Show more...
3 months ago
33 minutes

The Identity Navigator
#27 Where Are the Aliens?

Have you ever wondered why we haven’t discovered alien life? And how does this connect to IAM maturity, systems thinking, and organizational psychology?

In this episode, I dive deep into the Fermi Paradox, explore the complexities of IAM maturity, and draw surprising parallels between the search for extraterrestrial intelligence and the journey organizations face in their IAM evolution.

Tune in as we map out the path from noise to clarity in IAM, and maybe even discover the “filter” we all need to overcome.


Email: theIdentityNavigator@gmail.com

LinkedIn: ⁠⁠https://www.linkedin.com/in/rohit-agnihotri/

Show more...
5 months ago
33 minutes 46 seconds

The Identity Navigator
#26 Bearer Tokens: From Briefcases to Browsers

This episode was inspired by Ozark: A crime drama where a financial advisor is pulled into the world of money laundering

 

Ever wondered why simply holding a token grants you access—no passwords, no challenges, just pure possession? In this episode we trace the surprising journey of bearer tokens from their financial origins to the backbone of modern digital identity.


Whether you’re architecting an OAuth flow, defending APIs, an Identity enthusiast, a historian, or simply curious about the mechanics behind that “Authorization: Bearer …” header, this episode will reshape your understanding of access control.


Email: theIdentityNavigator@gmail.com

LinkedIn: ⁠https://www.linkedin.com/in/rohit-agnihotri/

Show more...
6 months ago
24 minutes 9 seconds

The Identity Navigator
#25 Resource Mining - A pre-requisite that is never met

In the context of IAM, resource mining refers to theprocess of discovering, cataloging, and analyzing resources within an organization's environment to understand their structure, permissions, ownership, and access controls. The goal is often to gain visibility into the resources (e.g., applications, servers, databases, files, or cloud infrastructure), their associated identities and usage patterns , enabling effective governance, security, and compliance.

Let's understand this tricks of the trade and how it is applicable to a cloud solution,  zero trust strategy, an AD environment and an AD-Application-IGA ecosystem.


Email: theIdentityNavigator@gmail.com

LinkedIn: https://www.linkedin.com/in/rohit-agnihotri

Show more...
7 months ago
43 minutes 48 seconds

The Identity Navigator
#24 Self-Healing IAM Systems - A Business Centric Framework

A self-healing IAM system enhances enterprise security by automating identity governance, mitigating operational risks, and ensuring adaptive security resilience.

By leveraging this framework organizations cancreate dynamic, self-correcting identity frameworks that reduce administrative overhead and improve security posture.

Self-healing mechanisms ensure robust access management by automatically detecting and mitigating disruptions, policy misconfigurations, or security anomalies.


Email: theIdentityNavigator@gmail.com

LinkedIn: https://www.linkedin.com/in/rohit-agnihotri/

Show more...
8 months ago
22 minutes 58 seconds

The Identity Navigator
#23 Fractured Identity: An In-Depth Exploration

Fractured identity occurs when a single user is unintentionally associated with multiple distinct accounts across different systems or within the same system.


This fragmentation can arise in several scenarios, such as customer service interactions, where new user identities are created without linking them to existing ones, or when identity data across different systems is inconsistentor cannot be reconciled.

Lets deep dive into this topic and learn how to create awareness, get started, spot and solve this.


Contact Us:

Email: theIdentityNavigator@gmail.com

LinkedIn:  https://www.linkedin.com/in/rohit-agnihotri

Show more...
8 months ago
31 minutes 45 seconds

The Identity Navigator
#22 Unquestioned Assumptions

In this episode we understand what "Unquestioned Assumptions" are, why they are limiting and how to recognize them.


At its core, these are beliefs, habits, or expectations we adopt without verifying their accuracy or relevance. They shape our decisions, guide our strategies, and even influence how we view success.


Contact Us:

Email: theIdentityNavigator@gmail.com

LinkedIn: https://www.linkedin.com/in/rohit-agnihotri/

Show more...
9 months ago
26 minutes 35 seconds

The Identity Navigator
#21 Graph DB: A must have for intelligent IAM systems

In this episode, we take a deep dive into the role of graph databases in Identity and Access Management (IAM) and explore why they are becoming indispensable in modern IAM systems.

For over 25 years, LDAP and relational databases have been he backbone of IAM. However, as the demands of IAM systems evolve, particularly in cloud-native and enterprise environments, it's clear that traditional databases are struggling to keep pace.

It's time to introduce graph databases, a technology inherently suited for many IAM use cases. While relational databases offer consistency and robust transactional support, they falter in handling the growing complexity of dynamic access control and scalable architectures. Graph databases, on the other hand, excel at managing complex relationships and connections—key elements in modern IAM systems.

In this episode, we discuss the limitations of RDBMS systems and explore how graph databases can transform IAM by offering smarter, more adaptable solutions for today's identity challenges.

Email: theIdentityNavigator@gmail.com

LinkedIn: https://www.linkedin.com/in/rohit-agnihotri/

Show more...
1 year ago
40 minutes 5 seconds

The Identity Navigator
#20 Unlocking PKI: Why It's Not Yet Mainstream in Identity and Access Management

In this episode, we dive into the world of Public Key Infrastructure (PKI) and explore why it's not more widely adopted in the Identity and Access Management (IAM) space,  despite being considered the gold standard of credential assurance by many experts.

We'll unravel the complexities of PKI, discuss its advantages and challenges, and examine the reasons behind its limited mainstream presence.

Whether you're a security professional or just curious about IAM technologies, this episode will provide valuable insights into the potential of PKI and what it could mean for the future of digital security.

Join us as we decode the mysteries of PKI and its role in modern identity management.


Email: theIdentityNavigator@gmail.com

LinkedIn: https://www.linkedin.com/in/rohit-agnihotri/


The Identity Navigator

Show more...
1 year ago
54 minutes 11 seconds

The Identity Navigator
#19 Beyond PAM for BeyondTrust - A new ITDR offering: Identity Security Insight

BeyondTrust mention reminds most of us of privileged access management. Interestingly on their website, the first thing they mentioned was "PAM Products and ITDR"


BeyondTrust has multiple products in their product suite and the one of the newest addition is Identity Security Insight, launched in 2023 and focused on ITDR

Let's check them out together 

Website: https://www.beyondtrust.com/

Free Identity Security Assessment: https://www.beyondtrust.com/products/identity-security-insights/assessment


Email: theIdentityNavigator@gmail.com

Show more...
1 year ago
26 minutes 11 seconds

The Identity Navigator
#18 ITDR - A promising domain or just another fad

In this episode of the Identity Navigator podcast, we explore the multifaceted world of Identity Threat Detection and Response (ITDR).

The episode delves into how various players in the market each bring their unique interpretations of ITDR, contributing to a diverse and innovative landscape. This diversity is pushing the boundaries of identity security, prompting a deep dive into the intricacies of ITDR and its viability.

We discuss whether ITDR is effectively addressing the growing challenges of identity-based threats or if it is merely capitalizing on the fears of security executives to drive revenue.

Join us as we navigate through these critical topics and uncover the true impact of ITDR in the current cybersecurity environment.

Email: theIdentityNavigator@gmail.com

Show more...
1 year ago
23 minutes 11 seconds

The Identity Navigator
#17 Continuous Access Evaluation and Twosense - fascinating domain and a wonderful product
Some call it continuous MFA, some call it continuous access evaluation, but it's starting to become part of the enterprise security. This can tie back into NIST, Zero Trust Architecture or in  PCI compliance. It’s just not a different form of MFA, it is more then that and Twosense is leading that space. They can be found online at www.twosense.ai as well as on LinkedIn (https://www.linkedin.com/company/twosense.ai). Send your show related queries and thoughts to theIdentityNavigator@gmail.com
Show more...
1 year ago
36 minutes 32 seconds

The Identity Navigator
#16 PlainID and PBAC - An excellent solution to a very relevant problem
A deep dive into Authorization, Policy Based Access Control (PBAC) and how PlanID is solving the problem http://www.plainid.com Docs - https://docs.plainid.io Dev portal -  https://docs.plainid.io/v1-api Integration hub - https://www.plainid.com/ispm-platform/integration-hub/ Knowledge base - https://plainid.atlassian.net/servicedesk/customer/portal/16/article/2951151895
Show more...
1 year ago
49 minutes 34 seconds

The Identity Navigator
#15 AWS IAM Series: Part 3 - AWS Storage & Database Services
umping to cloud IAM could be overwhelming. In this multi part series, we dive into cloud computing, AWS cloud, AWS IAM and compare and contrast the cloud concepts with the legacy concepts giving the listeners a foundational knowledge of all things cloud IAM. We focus on AWS storage and database services in this episode.
Show more...
1 year ago
36 minutes 24 seconds

The Identity Navigator
#14 AWS IAM Series: Part 2 - AWS Storage Services
For a mid level IAM practitioner, jumping to cloud IAM could be overwhelming. In this multi part series, we dive into cloud computing, AWS cloud, AWS IAM and compare and contrast the cloud concepts with the legacy concepts giving the listeners a foundational knowledge of all things cloud IAM. We focus on AWS storage services in this episode.
Show more...
1 year ago
35 minutes 1 second

The Identity Navigator
#13 AWS IAM Series: Part 1 - Basics of AWS, AWS IAM and comparison with on-premises IAM concepts
For a mid level IAM practitioner, jumping to cloud IAM could be overwhelming. In this multi part series, we dive into cloud computing, AWS cloud, AWS IAM and compare and contrast the cloud concepts with the legacy concepts giving the listeners a foundational knowledge of all things cloud IAM
Show more...
1 year ago
42 minutes 2 seconds

The Identity Navigator
#12 Prioritizing Effectiveness over Efficiency and how does it translates into being more Strategic
How to Prioritize Effectiveness over Efficiency, what does it mean, how to achieve it and why should we strive towards it? We will also look into how being effective directly translates into being strategic.   The true value of IAM team is conveyed only when it meets the requirements of other teams. Thus as IAM professionals we need to understand the pivotal role of effectiveness over mere efficiency.
Show more...
1 year ago
28 minutes 36 seconds

The Identity Navigator
IDaaS 101, how is it different from IdP and LDAP, CSP
Let’s dive into the word of Identity as a Service. What is it, how does it differ from Identity Providers, traditional LDAPs. We dive into not just IDaaS but also its features and key concepts
Show more...
1 year ago
40 minutes 27 seconds

The Identity Navigator
IAM - A deep divide between ground reality and vendors developing IAM tools
We discuss the deep divide between the reality of IAM maturity in most organizations and the maturity of vendor landscape. The IAM vendor landscape is pretty mature and we are mostly on 3rd generations of IAM tools. In reality the organizations are still struggling with IAM generation 1 problem.
Show more...
1 year ago
23 minutes 58 seconds

The Identity Navigator
Welcome to "The Identity Navigator," your compass in the world of Identity and Access Management (IAM). Join us as we navigate the complexities of digital identity, security, and access control. Stay informed with expert insights, industry trends, and practical tips to safeguard your organization's digital assets. Whether you're new to IAM or a seasoned pro, tune in to unlock the strategies that will elevate your security posture. Subscribe to The Identity Navigator podcast and chart your course to secure, efficient IAM solutions.