#411 - Making IAM a Best Buy with Greg Handrick

#411 - Making IAM a Best Buy with Greg Handrick

Jim McDonald sits down with Greg Handrick, Director of IAM at Best Buy, for a wide-ranging conversation on running enterprise identity at one of America's largest consumer electronics retailers. Greg traces a nonlinear career path from Oracle DBA and Novell administrator to IAM director. The discussion covers Best Buy's CIO-reporting structure for IAM, how their steering committee evolved from status meetings into a strategic body, and managing identity across workforce, vendors, marketplace sellers, and non-human identities. Greg and Jim also dig into communicating identity value in business language, making the investment case without FUD, identity and cyber convergence, AI adoption, and psychological safety on a well-run IAM team. The Lighter Note wraps with Greg's YouTube-powered DIY hobby life.Connect with Greg: https://www.linkedin.com/in/greghandrick/Connect with us on LinkedIn:Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/Visit the show on the web at http://idacpodcast.comTimestamps00:00:00 Intro and upcoming event announcements00:03:00 Meet Greg Handrick, Director of IAM at Best Buy00:04:00 What is Best Buy?00:05:00 Greg's career path from Oracle DBA to IAM Director00:12:00 IAM reporting to the CIO vs. the CISO00:17:00 How Best Buy's IAM steering committee evolved00:22:00 Third-party and non-human identities at scale00:24:00 Identity as a team sport and imposter syndrome00:27:00 Communicating identity value in business language00:28:00 Making the investment case for IAM without FUD00:32:00 Identity and cybersecurity convergence at Best Buy00:35:00 Balancing technical depth with business acumen00:38:00 AI in identity programs today00:39:00 Leadership philosophy and psychological safety00:43:00 Will AI replace identity practitioners?00:46:00 Ledger Note: DIY projects and the power of YouTubeKeywords: IDAC, Identity at the Center, Jim McDonald, Jeff Steadman, Greg Handrick, Best Buy, IAM, identity and access management, identity security, CIO, CISO, steering committee, SailPoint, Ping Identity, Active Directory, third-party identity, non-human identity, identity governance, PAM, privileged access management, zero trust, AI in identity, leadership, retail IAM, imposter syndrome, psychological safety


Jaksot(418)

#10 - South of the Border with Arturo Cordoba

#10 - South of the Border with Arturo Cordoba

On this episode, Jim and Jeff talk with Arturo Cordoba, Senior Advisor on the Cyber Security team with Cemex in Mexico, about the differences in IAM in Mexico compared to the United States, building I...

6 Syys 201943min

#9 - Authentication Talk with Mario from Callsign

#9 - Authentication Talk with Mario from Callsign

On this episode, Jim and Jeff talk with Mario Dusaj, solutions architect at Callsign.com, about his thoughts around creating a good authentication experience.Want to join the conversation? Leave us a ...

30 Elo 201935min

#8 - Talking IAM with Ash Motiwala

#8 - Talking IAM with Ash Motiwala

On this episode, Jim and Jeff talk with Ash Motiwala, Managing Partner at Identropy, about the history of Identropy, current IAM trends, and the future of IAM.Want to join the conversation? Leave us a...

23 Elo 201938min

#7 - How the IAM Value Proposition Has Changed

#7 - How the IAM Value Proposition Has Changed

On this episode, Jim and Jeff talk with Luis Almeida, VP of Business Development at Identropy, about how the value proposition for IAM has changed over the years. You can read his take here.Want to jo...

16 Elo 201945min

#6 - Black Hat 2019

#6 - Black Hat 2019

Warshipping, US military CAC's on the way out, and how to identify Deepfakes... all topics of discussion brought to the table by Jeff who has his boots on the ground at the annual Black Hat conference...

9 Elo 201933min

#5 - What Just Left Your Wallet?

#5 - What Just Left Your Wallet?

On this episode, Jim and Jeff talk about the recent news regarding the Capital One data breach and what might have been the motivations behind the incident. They also reference this video when talking...

2 Elo 201928min

#4 - The Circle of (IGA) Life

#4 - The Circle of (IGA) Life

On this episode, Jim talks with Jeff about his idea in an upcoming article he is writing about the IGA lifecycle: Approve - Provision - Collect - VerifyWant to join the conversation? Leave us a messag...

26 Heinä 201930min

#3 - Healthcare IAM, MFA, and PAM Oh My!

#3 - Healthcare IAM, MFA, and PAM Oh My!

On this episode, Jim and Jeff talk about Kacy Zurkus' article "Healthcare Organizations Too Confident in Cybersecurity" for InfoSecurity Magazine and  why multi-factor authentication (MFA) isn't more ...

19 Heinä 201932min