Join us this week as we engage in an enlightening conversation with David Tyburski, VP of Information Security and the CISO of Wynn Resorts. With over 15 years in the field, David offers his expertise on leveraging automation to provision across the entire user access lifecycle. Get ready to uncover the intriguing challenges he has faced, his strategies for data protection, and his outlook on the inevitability of breaches in security.
We explore the critical role of identity management and access control in cybersecurity. Listen in as we dissect the crucial aspects of identity management, and learn why pre-authorization and continuous monitoring are indispensable in warding off potential intruders. We take you through the necessity of automating security processes and how this can relieve an audit team's burden and let them concentrate on more pressing matters.
Finally, we take a step back and look at the broader picture - leadership in the advancement of the security field. Drawing on David’s experiences, he shares tips on networking, professional growth, and the importance of understanding the industry we’re in.
Identity Radicals: Conversations with cybersecurity experts
Hosted by industry experts and featuring exclusive interviews with security executives, Identity Radicals covers the critical topics that every organization is facing as they secure their apps and systems, both in the cloud and on-prem.
When things go wrong with security, it’s the CISO who ends up in the hot seat. That’s why a proactive approach to Identity Security has never been more important - not only to protect your organization and customers, but your sanity too! “Identity Radicals" is your trusted source for practical advice, real-world examples, and actionable solutions. Whether you're a seasoned security professional or someone looking to enhance your understanding of identity security, this podcast is designed to propel you forward on your cybersecurity journey.
Join us for “Identity Radicals” – brought to you by Veza. Subscribe on YouTube to view upcoming video episodes or listen wherever you get your podcasts!
5 Actionable Strategies to Improve Security Posture
We did a deep dive into cyber security, identity security, and evolving digital threats. Implement…
A field guide to bad permissions part 2: expired permissions
Why expired permissions go unnoticed The main reason expired permissions go unnoticed is that it’s…