in ,

Shared irresponsibilities and the importance of product privacy: Apple vs Microsoft – Mark Batchelor, Vibhuti Sinha, Chris Simmons, Gerry Gebel, Ajay Gupta, Tarvinder Sembhi – ESW #365


Jun 14, 2024

This week, we’ve got data security being both funded AND
acquired. We discuss Lacework’s fall from unicorn status and why
rumors that it went to Fortinet for considerably more than Wiz was
willing to pay make sense.

Microsoft Recall and Apple Intelligence are the perfect bookends
for a conversation about the importance of handling consumer
privacy concerns at launch.

How can the Snowflake breach both be one of the biggest breaches
ever, but also not a breach at all (for Snowflake, at least). It’s
time to have a conversation about shared responsibilities, and when
the line between CSP and customer needs to shift.

The CSA’s AI Resilience Benchmark leaves much to be desired
(like, an actual usable benchmark) and Greg Linares tells a wild
story about how the first Microsoft Office 2007 vulnerability was
discovered.

Finally, the Light Phone III was announced. Do we finally have a
usable minimalist, social media detox-friendly phone option? Will
Adrian have to buy one to find out?

Several recent trends underscore the increasing importance of
Know Your Business (KYB) practices in today’s business landscape.
One significant trend is the rise in financial crimes, including
money laundering, fraud, and terrorist financing. Technological
advancements have transformed the way businesses operate, leading
to increased digitization, online transactions, and remote customer
interactions. While these developments offer numerous benefits,
they also create opportunities for criminals to exploit
vulnerabilities. Higher value remote transactions are performed at
higher volumes. In addition, government programs such as the PPP
program created a need for onboarding business quickly. This
created a influx of fraudulent entities and claim who are now
exploiting other channels. The convergence of these trends
highlights the critical role of KYB in safeguarding businesses,
ensuring regulatory compliance, and fostering trust among
stakeholders in today’s dynamic and interconnected business
environment.

Segment Resources:
https://files.scmagazine.com/wp-content/uploads/2024/05/idi-Identiverse-Brochure_05-2024-KYB-PRINT.pdf

This segment is sponsored by IDI. Visit https://securityweekly.com/idiidv
to learn more about them!

From wrestling with integration complexities to managing
unexpected glitches, the realities of SSO implementation can
produce very different results than what you want. Are users
actually using SSO to login or are they still using the direct
logins they gained before enabling SSO? We explore the reasons
behind why SSO efficacy isn’t always what it seems and what you can
do about it.

This segment is sponsored by Savvy. Visit https://securityweekly.com/savvyidv
for a no cost SaaS-Identity checkup!

With identity being the new security perimeter, identity
platforms are now an integral part of the core security stack.
Inherently these platforms are complex and it takes months and
years for organizations to realize the business value. And this is
going to get worse. The sheer volume and velocity with which new
identity types are being added, as well the sophistication of
attacks on identity platforms, requires a transformational shift to
Identity security and governance. 50% operational efficiency and
delivering security at scale are the two big initiatives which
organizations have embarked on. In this session, Vibhuti Sinha,
Chief Product Officer of Saviynt will share his insights and
discuss how Saviynt is at the forefront of this transformation.

This segment is sponsored by Saviynt. Visit https://securityweekly.com/saviyntidv
to learn more about them!

Enterprises often struggle with achieving business value in
identity programs. This is typically the result of technology
choices that require a disproportionately greater amount of effort
and focus and underestimating the workforce required for
organizational change management. With 30 years in the industry and
a depth of accumulated knowledge working with large, global
customers and vendors, we share how to identify and realize the
business value in your organization’s identity program.

Segment Resources:
https://files.scmagazine.com/wp-content/uploads/2024/05/SDG-IAM-Brief-1.pdf

https://files.scmagazine.com/wp-content/uploads/2024/05/SDG-IAM-Modernization-Service-Brief-1-1.pdf

This segment is sponsored by SDG. Visit https://securityweekly.com/sdgidv
to learn more about them!

In today’s increasingly complex cloud environments, ensuring
continuous access to identity services is critical for maintaining
business operations and security. Gerry Gebel, VP of Product and
Standards at Strata Identity, will discuss the recently announced
Identity Continuity product, designed to provide uninterrupted
identity services even during outages. Unlike traditional disaster
recovery solutions, Identity Continuity autonomously fails over to
alternate identity providers, ensuring seamless access management.
Join us to explore how Strata Identity is enhancing resilience in
the identity management space.

Segment Resources: Strata Identity Continuity Product page:
https://www.strata.io/maverics-platform/identity-continuity/
State of Multi-Cloud Identity report:
https://strata.io/wp-content/uploads/2023/08/State-of-multi-cloud-identity-2023_Strata-Identity.pdf

Parametrix Survey =
https://www.reinsurancene.ws/leading-cloud-service-providers-faced-1000-disruptions-in-2022-parametrix/

This segment is sponsored by Strata. Visit https://securityweekly.com/strataidv
to learn more about them!

Digital businesses are under attack from account and platform
fraud, including Account Takeover (ATO), account opening fraud, and
many variations of fraudulent account scams, impersonations,
transactions and collusions. Learn best practices to stop fraud
with better detection and prevention that can also improve customer
satisfaction and operating efficiencies.

This segment is sponsored by Verosint. Visit https://securityweekly.com/verosintidv
to learn more about them!

Visit https://www.securityweekly.com/esw
for all the latest episodes!

Show Notes: https://securityweekly.com/esw-365

What do you think?

Leave a Reply

Your email address will not be published. Required fields are marked *

GIPHY App Key not set. Please check settings

Temporary Lifetime Extension: Complicated Cases

Liquidmatrix Security Digest Podcast – Episode 79