This episode is sponsored by Permiso. Visit permiso.io/idac to learn more.
In this sponsored episode of the Identity at the Center Podcast, hosts Jeff and Jim sit down with Paul Nguyen, co-founder and co-CEO of Permiso, to discuss the critical role of identity security in modern information security. Paul shares insights into the history of identity threats, the rise of identity-focused attacks like Scattered Spider and LLM Jacking, and the importance of real-time identity monitoring for both human and non-human identities across cloud and on-prem environments. The episode explores how Permiso is positioned in the market to provide comprehensive identity threat detection and response (ITDR) and identity security posture management (ISPM), offering advanced visibility and proactive measures against emerging threats.
Chapters
00:00 Introduction to Security Vendors
00:50 Welcome to the Identity at the Center Podcast
01:30 Sponsored Spotlight: Permiso
02:14 Meet Paul Nguyen, Co-Founder of Permiso
03:34 The Importance of Identity in Security
05:35 Permiso's Unique Approach to Identity Security
07:36 Real-Time Monitoring and Threat Detection
09:23 Challenges and Solutions in Identity Security
15:16 Modern Attacks and Identity Threats
25:56 The Role of Honeypots in Security Research
26:49 Challenges of Maintaining Security
27:15 Honeypots and Breach Detection
27:46 Dwell Time and Reconnaissance
28:34 Password Complexity and Monitoring Gaps
29:24 Roles and Responsibilities in Identity Security
29:49 Unified Identity Security Teams
30:57 Emerging Threats and Joint Efforts
32:49 Permiso's Role in Identity Security
34:10 Detection and Response Strategies
36:11 Managing Identity Risks
36:51 Combining Prevention and Detection
39:44 Real-World Applications and Challenges
51:17 Personal Insights and Final Thoughts
Connect with Paul: https://www.linkedin.com/in/paulnguyen/
Learn more about Permiso: https://permiso.io/idac
Connect with us on LinkedIn:
Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/
Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/
Visit the show on the web at idacpodcast.com and watch at idacpodcast.tv
Keywords:
identity security, real-time monitoring, IAM, cybersecurity, identity exploitation, modern attacks, insider threats, honeypots, organizational structure, Non-Human Identities, Identity Security, Permiso, Risk Management, Insider Threat, Shadow IT, Identity Graph, ITDR, ISPM, Cybersecurity