Identity Radicals: Conversations with cybersecurity experts
Hosted by industry experts and featuring exclusive interviews with security executives, Identity Radicals covers the critical topics that every organization is facing as they secure their apps and systems, both in the cloud and on-prem.
When things go wrong with security, it’s the CISO who ends up in the hot seat. That’s why a proactive approach to Identity Security has never been more important – not only to protect your organization and customers, but your sanity too! “Identity Radicals” is your trusted source for practical advice, real-world examples, and actionable solutions. Whether you’re a seasoned security professional or someone looking to enhance your understanding of identity security, this podcast is designed to propel you forward on your cybersecurity journey.
Join us for “Identity Radicals” – brought to you by Veza. Subscribe on YouTube to view upcoming video episodes or listen wherever you get your podcasts!
This week, Identity Radicals brings you an insightful episode delving into the critical aspects of cybersecurity and information protection with guest Rachel Wilson, the head of Cyber Security at Morgan Stanley Wealth Management. Rachel explores with podcast host, Jason Garoutte, about the ever-growing concern of identity-based targeting, shedding light on the vulnerabilities that persist in our interconnected world.
Rachel characterizes how Multifactor Authentication (MFA) alone falls short of guaranteeing robust security. They dive into the intricacies of scaling security measures practically, while maintaining an optimum balance between risk management and compliance adherence.
They also provide invaluable insights into addressing security queries from the board of organizations. Moreover, the hosts highlight the transformative power of automation in fortifying cybersecurity defenses and discuss the ongoing challenge of recruiting and nurturing new talent in the field.
Our employees are both our first line of defense and our greatest point of risk. This is why monitoring both internally and externally is crucial… If you can identify an employee whose behavior is abnormal, either because they are doing something strange, or their identity has been co-opted in a way that indicates that you’ve got a problem, these kinds of detective controls are crucial in today’s environment.Rachel Wilson || Head of Cybersecurity, Morgan Stanley Wealth Management