logo
episode-header-image
Oct 2024
33m 3s

Cloud Identity Lifecycle Management Expl...

Cloud Security Podcast Team
About this episode

In this episode Ashish Rajan sits down with Shashwat Sehgal, co-founder and CEO of P0 Security, to talk about the complexities of cloud identity lifecycle management. Shashwat spoke to us about why traditional identity solutions like SAML are no longer sufficient in today’s cloud environments. He discusses the need for organisations to adopt a more holistic approach to secure access across cloud infrastructures, addressing everything from managing IAM roles to gaining complete visibility and inventory of all cloud identities.

This episode goes into the growing challenges around managing human and non-human identities, and the importance of shifting from legacy solutions to cloud-native governance.


Guest Socials:⁠⁠ ⁠⁠⁠⁠⁠⁠⁠Shashwat's Linkedin

Podcast Twitter ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@CloudSecPod⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠

If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:

- ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Podcast- Youtube⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠

- ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Newsletter ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠

⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security BootCamp


Questions asked:

(00:00) Introduction

(01:47) A bit about Shashwat

(02:20) What is Identity Lifecycle Management?

(04:55) What is IGA and PAM?

(10:10) Complexity of Identity Management

(13:12) What are non human identities?

(15:56) Maturity Levels for Cloud Identity Lifecycle Management

(19:03) The role of SAML in Identity Management

(20:07) Identity Management of Third parties and SaaS Providers

(21:28) Who’s responsible for identity management in Cloud?

(23:28) Changing landscape of identity management

(27:46) Native Solutions for identity management

(30:03) Fun Questions

Up next
Aug 22
New Identity Blueprint for a Future with Cloud & AI
Identity is the root cause of over 70% of all security incidents, yet many organizations still rely on fundamentally flawed authentication methods. In this episode, Jasson Casey, CEO and co-founder of Beyond Identity, explains why even common forms of MFA are insufficient and why ... Show More
49m 44s
Aug 8
AI for SOC Automation: A Blueprint for the New world of Incident Response
The nature of Security Operations is changing. As cloud environments grow in complexity and data volumes explode, traditional approaches to detection and response are proving insufficient. This episode features an in-depth conversation with Kyle Polley, who leads the AI security ... Show More
52m 39s
Aug 7
The Truth About Agentic AI in the SOC: Reality vs. Hype
What does the integration of AI into a Security Operations Center (SOC) practically look like? This episode explores the concept of the "Agentic SOC," moving beyond marketing terms to discuss its real-world applications and limitations.Ashish Rajan is joined by Edward Wu, CEO of ... Show More
52m 39s
Recommended Episodes
Sep 2024
IAM Identity Center, Part 1
In this week's episode, we dive deep into the world of AWS Identity Center and explore how it changed workforce identity access management within the AWS ecosystem. Join us as we discuss the key differences between IAM and Identity Center, unraveling how this powerful service is ... Show More
37m 49s
Apr 2025
Understanding SaaS Security: Insights, Challenges, and Best Practices
In this episode of Cybersecurity Today, host Jim Love delves into the topic of SaaS (Software as a Service) security. Sharing his early experiences promoting SaaS, Jim elaborates on its inevitable rise due to cost-effectiveness and shared development resources. The episode highli ... Show More
38m 5s
Jun 30
How the Digital Wallet Will Replace KYC - Jarek Sygitowicz
Episode Topic:Jarek Sygitowicz, co-founder of Authologic, joins PayPod to discuss how digital identity is being reinvented. From legacy systems to identity wallets and AI-enhanced security, Jarek maps out how businesses can stay compliant, secure, and conversion-optimized in a ra ... Show More
25m 51s
Oct 2024
#691: [MIGRATION SPECIAL SERIES] AJE Group's Cloud Transformation Journey to AWS with CloudHesive
In this episode, we explore AJE Group's journey to the cloud, discussing the business challenges that led them to seek a scalable, global IT infrastructure. We delve into their decision-making process in choosing AWS and CloudHesive as partners, and examine the specific AWS servi ... Show More
28m 6s
Feb 2025
Rethinking Cloud Security Strategies
Cloud security is more complex than ever. Organizations move fast, but security teams often struggle to keep up. In this episode of Threat Vector, host David Moulton speaks with Amol Mathur, SVP of Products for Prisma Cloud at Palo Alto Networks, about how platformization is resh ... Show More
35m 28s
Oct 2024
Identity and Access Management with Julianna Lamb
Authentication is a key requirement for any B2B software application, especially if software vendors are selling to enterprise clients who are likely to have strict authentication requirements for the vendors they use. However, building authentication for a B2B application is typ ... Show More
51m 13s
Nov 2021
The changing world of cloud CRM, with Chris Cognetta
Gemma Milne talks with Chris Cognetta, CongruentX’s Chief Technology Innovation Officer, about how cloud environments can help companies align their technology and operations to improve customer experiences and the importance of focusing on business outcomes, especially how these ... Show More
35m 33s
Jan 2022
Day Two Cloud 130: Getting Started With OpenShift For Kubernetes Orchestration
On today's Day Two Cloud we have a career conversation with Angela Andrews, a Solution Architect at Red Hat. Angela provides an introduction to OpenShift, a cloud-based offering for running and orchestrating Kubernetes containers in public clouds and on premises from Red Hat. We ... Show More
47m 50s
Jul 2024
Opal Security's Umaimah Khan on Security-First Identity
Too often, usernames and passwords are the only thing standing between cyber criminals and an organization's data. While it seems obvious, implementing stronger identity controls has historically been a challenge for organizations because the mechanisms that cut off access to thr ... Show More
36 m
Jun 14
The Secret CISO: Navigating the Human and Technical Challenges in Cybersecurity
In this episode of 'Cybersecurity Today,' hosts John Pinard and Jim Love introduce their unique show, 'The Secret CISO,' which aims to dive deep into the lives and thoughts of CISOs and similar roles, beyond the usual interview-style format. The guest for this episode is Priya Mo ... Show More
51m 57s