#389 - Sponsor Spotlight - Aembit

#389 - Sponsor Spotlight - Aembit

This episode is sponsored by Aembit. Visit aembit.io/idac to learn more.

Jeff and Jim welcome David Goldschlag, CEO and Co-founder of Aembit, to discuss the rapidly evolving world of non-human access and workload identity. With the rise of AI agents in the enterprise, organizations face a critical challenge: how to secure software-to-software connections without relying on static, shared credentials.

David shares his unique background, ranging from working on The Onion Router (Tor) at the Naval Research Lab to the DIVX rental system, and explains how those experiences inform his approach to identity today. The conversation covers the distinction between human and non-human access, the risks of using user credentials for AI agents, and why we must shift from managing secrets to managing access policies.

This episode explores real-world use cases for AI agents in financial services and retail, the concept of hybrid versus autonomous agents, and practical advice for identity practitioners looking to get ahead of the agentic AI wave.


Visit Aembit: https://aembit.io/idac

Connect with David: https://www.linkedin.com/in/davidgoldschlag


Connect with us on LinkedIn:

Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/

Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/

Visit the show on the web at idacpodcast.com


Timestamps

00:00 - Intro00:51 - Pronunciation of Aembit and the extra 'E'01:56 - David's background: From NSA to Enterprise Security04:58 - The meaning behind the name Aembit06:00 - David's history with The Onion Router (Tor)10:00 - Differentiating Non-Human Access from Workforce IAM11:39 - The security risks of AI Agents using human credentials14:15 - Manage Access, Not Secrets16:00 - Use Cases: Financial Analysts and Retail24:00 - Hybrid Agents vs. Autonomous Agents30:38 - Will we have agentic versions of ourselves?36:45 - How Identity Practitioners can handle the AI wave38:33 - Measuring success and ROI for workload identity43:20 - A blast from the past: DIVX and Circuit City52:15 - Closing


Keywords

IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, Aembit, David Goldschlag, Non-human access, Workload Identity, AI Agents, Machine Identity, Cybersecurity, IAM, InfoSec, Tor, DIVX, Zero Trust, Secrets Management, Authentication, Authorization

Episoder(391)

Identity At The Center #7: How the IAM Value Proposition Has Changed

Identity At The Center #7: How the IAM Value Proposition Has Changed

On this episode, Jim and Jeff talk with Luis Almeida, VP of Business Development at Identropy, about how the value proposition for IAM has changed over the years. You can read his take here. Want to join the conversation? Leave us a message here: anchor.fm/identity-at-the-center/message

16 Aug 201945min

Identity At The Center #6: Black Hat 2019

Identity At The Center #6: Black Hat 2019

Warshipping, US military CAC's on the way out, and how to identify Deepfakes... all topics of discussion brought to the table by Jeff who has his boots on the ground at the annual Black Hat conference in Las Vegas. Want to join the conversation? Leave us a message here: anchor.fm/identity-at-the-center/message

9 Aug 201933min

Identity At The Center #5: What Just Left Your Wallet?

Identity At The Center #5: What Just Left Your Wallet?

On this episode, Jim and Jeff talk about the recent news regarding the Capital One data breach and what might have been the motivations behind the incident. They also reference this video when talking about man in the middle attacks against two-factor authentication. Want to join the conversation? Leave us a message here: anchor.fm/identity-at-the-center/message

2 Aug 201928min

Identity At The Center #4: The Circle of (IGA) Life

Identity At The Center #4: The Circle of (IGA) Life

On this episode, Jim talks with Jeff about his idea in an upcoming article he is writing about the IGA lifecycle: Approve - Provision - Collect - Verify Want to join the conversation? Leave us a message here: anchor.fm/identity-at-the-center/message

26 Jul 201930min

Identity At The Center #3: Healthcare IAM, MFA, and PAM Oh My!

Identity At The Center #3: Healthcare IAM, MFA, and PAM Oh My!

On this episode, Jim and Jeff talk about Kacy Zurkus' article "Healthcare Organizations Too Confident in Cybersecurity" for InfoSecurity Magazine and why multi-factor authentication (MFA) isn't more widely adopted. Jeff also poses a question to Jim: Do you choose MFA or Privileged Access Management (PAM) first if you can only do one? Want to join the conversation? Leave us a message here: anchor.fm/identity-at-the-center/message

19 Jul 201932min

Identity At The Center #2: Getting into the sexy world of IAM

Identity At The Center #2: Getting into the sexy world of IAM

With Jim on vacation this week, Jeff has called up Fletcher Edington as a pinch hitter. Fletcher talks about his path from college intern to IAM implementation engineer to IAM sales. They also talk about how to get young talent into the IAM space to solve the UI and design challenges of the future. Want to join the conversation? Leave us a message here: anchor.fm/identity-at-the-center/message

12 Jul 201931min

Identity At The Center #1: Introduction to an IAM Strategy Framework

Identity At The Center #1: Introduction to an IAM Strategy Framework

It's our first one! Hosts Jim McDonald and Jeff Steadman have a combined 30 years of experience in the identity and access management field. In this episode, they talk about how to create identity and access management strategies to better secure your organization. ***Correction - In this episode, we mention our friend Mario. He works at Callsign and not Transmit Security. Sorry, Mario!***

2 Jul 201937min

Populært innen Teknologi

lydartikler-fra-aftenposten
romkapsel
tomprat-med-gunnar-tjomlid
rss-avskiltet
teknisk-sett
rss-impressions-2
shifter
nasjonal-sikkerhetsmyndighet-nsm
smart-forklart
fornybaren
elektropodden
energi-og-klima
teknologi-og-mennesker
pedagogisk-intelligens
rss-polypod
rss-bouvet-bobler
rss-alt-som-gar-pa-strom
blaskjerm-brodrene
rss-snakk-om-sikkerhet
rss-rimelig-mistenkelig