Cybersecurity Architecture: Who Are You? Identity and Access Management
ฝัง
- เผยแพร่เมื่อ 15 พ.ค. 2024
- IBM Security QRadar EDR : ibm.biz/BdyzJA
IBM Security X-Force Threat Intelligence Index 2023: ibm.biz/BdyzJ9
Who are you? What system capabilities are you permitted? If you leave the company, what accesses need to be removed? These are all questions that fall in the identity and access management domain. In the fourth episode of the series, Jeff Crume explains IAM, which he defines as "the new perimeter" of cybersecurity.
Get started for free on IBM Cloud → ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → ibm.biz/subscribe-now
#AI #Software #ITModernization #Cybersecurity #QRadar #JeffCrume
Simply superb how he explains it all. 10 out of 10 for each of his videos! Thanks a lot!
Thanks so much!!!
I totally agree!!! Thank you!
What tech is used for this “chalk talk virtual presentation style” I’m a big fan!
Hands down one of the best instructors I've ever listened to.
You are too kind! Thank you!
Crystal clear and engaging explanations, thank you for all this material!
I was litteraly refreshing once in a while today hoping for the 4th episode! and I snaped it at "44seconds ago"!
Where are previous 3? it doesn't say episode 4 on the tittle
You can see the previous three parts in this playlist: th-cam.com/play/PLOspHqNVtKADkWLFt9OcziQF7EatuANSY.html
Really helpful series, I'm working in IAM for 5 years and this video really made me see the bigger picture more clearly, always happy to learn more, thank you!
I’m really glad to hear that it helped!
Excellent presentation!
thank you for sharing this!
Really amazing. Thank you
Amazing content thank you for making it so clear.
Good lecture. Thank you sir
Thanks! I have an interview coming up, and this helped me prepare for it!
A wonderful series
Best session ever referred for IAM topic..👏
Your explanation is best out of the best🎉
Wow, this is awesome! Good job with creating such content!
Well made, informative and thoroughly engaging content overall. Keep it up good people!
thank you !
I'm gonna rewatch this one a couple of times. Thank you so much for the great content
You are most welcome!
Great content.
Superb simple and informative video to explain what IAM, thank you so much Jeff you are my new master :)
You are very kind to say so! 😊
So well done and presented in such a succinct, engaging way! I didn't even notice the video was 30 minutes long, the time flew by! Thanks so much for the amazing content!
Thanks so much for the positive feedback! I was worried about the duration. Glad it didn’t put you to sleep 😴
I really love the way of explanation with simple way and will watch all stuff.. thank a lot
You are very welcome!
Thank you so much for this video. It is now as clear as day. Thumbs-up of course.
@georgesmith9178 thanks for saying so! IAM is a complex topic. Always hard to know just how deep to go without boring people
Thanks again Jeff. Content is so engaging and concise. We appreciate the continual knowledge share in your expert fashion
@jgrimes997 and I really appreciate the kind complements of support!
Nothing will ever be airtight but as a SOC Analyst I really appreciate what IAM contributes the environment I work with. I think down the line it's going to allow more small/mid-size businesses to have a stronger security posture, which is awesome. I'm a HUGE fan of the temporary passwords used in the PAM system you describe around 24:35. To me IAM is one of those things that just makes sense for improving security. Excellent video, and I'm looking forward to hearing about endpoint security next.
@CubensisEnjoyer great insights and thanks for the positive feedback! We hope to drop a new video each week until the 10 part series is complete
You are an amazing Teacher Jeff . Started watching this series:) it's really very informative Thank you for your work🙏😊just love your presentation and the way you are delivering information so that it encrypt in our mind 😀
Thanks so much for all the kind complements!
Brilliant! Great content, very well explained!
Thanks so much for the kind words!
just found your lecture mister Jeff,,,wonderfull,,,,,thankyou very much,,,,god bless you sir🙏
Thank you for watching!
This is going to be so helpful for me I’m going into a two year degree program for information system administration
Great job in explaining IAM!
Thanks!
Thank you. You are a really good presenter and the contents is brilliant and ver useful.
You are very welcome! Thanks for watching!
Thank God for the SSO system! 👏🏼👏🏼👏🏼🙌🏼
Indeed!
I lam earning DevOps from scratch and you just don't know how 100 % helpful this is! goodness!!!! I appreciate this lesson. Exquisite!!
Awesome! So glad this is helping! Best of luck to you!
This is awesome and very knowledgeable
Thanks for saying so!
That was one of the best cybersecurity videos I've ever seen, it was so great that it made me want to learn and teach these to other poeple as well
Wow, thank you!
I’m so glad to hear it! Thanks for the great feedback!
W😮W! This is really good! Thank you, sir!!
Thank you for watching!
Excellent granularity in the level of details. Becoming a Fan🙃
Thanks so much, Sri!
Like and subscribed
I just paused the video to give it a like,
Great explanation
So glad to hear that you liked it!
@@jeffcrume
Thank you for all the content, it's really helping us out. If possible please do a full detailed series on IAM.
I hope for an interview "access manager" role within my company and this video helps me a lot to understand the big picture and nail the interview hopefully!
Waiting for the call! Wish me luck!
Thanks a lot!
Update: Got the interview! Let's goo!!
Update: Interview went very good and I'm satisfied which is the most important thing... Now we wait!!!
Update: Got called for 2nd interview. Hope for the best!
Update: 2nd interview went very well!! I'm satisfied! Now we wait again! Keke
FINAL UPDATE: I GOT THE JOB!!!! Thank you all for your support and for the video!!! Let's celebrate!!
This is very comprehensive. First time I understood PAM and the use of CyberArk. What Tool would be used for Federation?
IBM’s Verify product implements this but there are some from other vendors as well
Great
Good video but at 9:54 you use the term 'account'... Wouldnt 'acces type' (i.e. email) be more appropriate? Or am I missing something here? Thank's!😊
@w33dcel Good question. It actually could be either. In most cases, organizations consider it a victory just to do the basic account management this way but in a perfect world, all access rights would be similarly controlled.
Please add application and OS admin to PAM section.
Definitely!