This week, Identity Radicals brings you an insightful episode delving into the critical aspects of cybersecurity and information protection with guest Rachel Wilson, the head of Cyber Security at Morgan Stanley Wealth Management. Rachel explores with podcast host, Jason Garoutte, about the ever-growing concern of identity-based targeting, shedding light on the vulnerabilities that persist in our interconnected world.
Rachel characterizes how Multifactor Authentication (MFA) alone falls short of guaranteeing robust security. They dive into the intricacies of scaling security measures practically, while maintaining an optimum balance between risk management and compliance adherence.
They also provide invaluable insights into addressing security queries from the board of organizations. Moreover, the hosts highlight the transformative power of automation in fortifying cybersecurity defenses and discuss the ongoing challenge of recruiting and nurturing new talent in the field.
Identity Radicals: Conversations with cybersecurity experts
Hosted by industry experts and featuring exclusive interviews with security executives, Identity Radicals covers the critical topics that every organization is facing as they secure their apps and systems, both in the cloud and on-prem.
When things go wrong with security, it’s the CISO who ends up in the hot seat. That’s why a proactive approach to Identity Security has never been more important - not only to protect your organization and customers, but your sanity too! “Identity Radicals" is your trusted source for practical advice, real-world examples, and actionable solutions. Whether you're a seasoned security professional or someone looking to enhance your understanding of identity security, this podcast is designed to propel you forward on your cybersecurity journey.
Join us for “Identity Radicals” – brought to you by Veza. Subscribe on YouTube to view upcoming video episodes or listen wherever you get your podcasts!
5 Actionable Strategies to Improve Security Posture
We did a deep dive into cyber security, identity security, and evolving digital threats. Implement…
A field guide to bad permissions part 2: expired permissions
Why expired permissions go unnoticed The main reason expired permissions go unnoticed is that it’s…