IAM 2.0: The Guide to Non-Human Identity Security & Governance
Автор: OASIS Security
Загружено: 2026-02-04
Просмотров: 34
Описание:
95% of the identities in your environment are no longer human. If your security strategy is still built around user access, you are leaving the vast majority of your attack surface exposed to credential misuse and sprawl.
In this session from Identity Management Day 2025, we present "IAM 2.0: Tales from the Frontline." Adam Ochayon, Director of Product Strategy & GTM at Oasis Security, breaks down the critical shift in identity security and the operational challenges of securing Non-Human Identities (NHIs).
You will learn:
Why traditional IAM playbooks fail to manage the scale of service accounts, secrets, and bots.
Real-world "horror stories" regarding inventory blind spots and secret sprawl in healthcare and cloud environments.
The "See, Secure, Govern" framework for regaining control over your non-human attack surface.
A step-by-step playbook to automate discovery, contextualize risk, and enforce lifecycle management.
Timestamps
0:00 - Intro: Why Old IAM Playbooks Are Failing
1:16 - Defining Non-Human Identities (NHIs): The Silent Backbone
2:36 - The Shift: Why 95% of Identities Are Now Non-Human
4:40 - Tales from the Frontline: The Reality of NHI Sprawl
5:46 - The Visibility Gap: Blind Spots in Discovery
8:09 - Case Study: The 6,000 Hidden Service Accounts
9:38 - The Security Gap: Secrets Leaked in Slack
12:37 - The Governance Gap: Finding Owners for Legacy Accounts
14:33 - The Solution: See, Secure, and Govern Framework
15:52 - The Playbook: 10 Steps to Automate NHI Lifecycle
Resources
Learn More About Oasis Security: https://www.oasis.security/
Connect with Adam Ochayon: / adamochayon
#IdentityManagementDay2025 #IAM #NonHumanIdentity #Cybersecurity #OasisSecurity
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: