Shownotes
Identity and access management, or IAM, is the name we use for the set of technologies and policies that control who accesses what resources inside a system—from company files being locked away for only some employees, to even your online banking account being accessible only to you.
With more individuals using more accounts to access more resources than ever before, threats have similarly emerged.
To better understand identity and access management, its impacts on the digital and physical world today, and who holds the responsibility to manage it, we’re talking today to Chuck Brooks, cybersecurity evangelist and adjunct professor for Georgetown University’s Applied Intelligence Program and graduate Cybersecurity Programs.