logo
Strata Identity Launches ‘The Identity Heroes' to Spotlight Real-World IAM Journeys

Strata Identity Launches ‘The Identity Heroes' to Spotlight Real-World IAM Journeys

Business Wire2 days ago

BOULDER, Colo.--(BUSINESS WIRE)-- Strata Identity, the Identity Orchestration company, today announced the launch of The Identity Heroes, a new video podcast (videocast) series that gives a voice to the people behind some of today's most challenging and impactful identity and access management (IAM) projects. Featuring candid, informal conversations, each episode of The Identity Heroes explores real-world stories, technical lessons, and personal reflections with CISOs, architects, and identity experts.
Each 40-minute episode features a relaxed, unscripted conversation focused on each Identity Heroes' professional journey, career-defining projects, challenges and learnings, and their perspective on the road ahead.
Share
Hosted by Strata's identity experts—including Field CTO Aldo Pietropaolo, VP of Product and Standards Gerry Gebel, and Senior Director of Product Marketing Mark Callahan— The Identity Heroes delves into real-world experiences of some of the industry's leading practitioners and pioneers. The series aims to educate and inspire IAM professionals with actionable insights and perspectives on topics such as modernization, Zero Trust, policy, and resilience.
'No one goes to school for identity, which is why we created The Identity Heroes —to celebrate the real people solving tough problems behind the scenes,' said Aldo Pietropaolo, Field CTO of Strata Identity. 'This videocast isn't about promoting products—it's about surfacing the lessons, breakthroughs, and moments of truth that can help others in the IAM community grow their careers and navigate complex challenges.'
Each 40-minute episode features a relaxed, unscripted conversation focused on each Identity Heroes' professional journey, career-defining projects, challenges and learnings, and their perspective on the road ahead.
The first three episodes of Identity Heroes featuring Eve Maler, President and Founder of Venn Factory, Sebastian Rohr, CTO of Umbrella.Associates GmbH and Sulohita Vaddadi, CISO of GE Corporate, are now live and available on YouTube, Spotify, and the Strata Identity website, with new episodes released every month.
Watch now: https://www.strata.io/identityheroes/
About Strata Identity
Strata Identity enables organizations to modernize identity providers without disrupting existing infrastructure while maintaining a frictionless user experience. By decoupling identity from applications, Strata's Maverics platform unifies SSO, supports multiple IDPs simultaneously, and ensures continuous access during outages via IDP failover. Led by CEO Eric Olden—co-author of the SAML standard— Strata also created the Identity Query Language (IDQL) and open-source Hexa project to help standardize multi-cloud identity management. Learn more at strata.io and follow us on LinkedIn and YouTube.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Agentic AI: The Next Leap In Container-Based Threat Detection
Agentic AI: The Next Leap In Container-Based Threat Detection

Forbes

timea day ago

  • Forbes

Agentic AI: The Next Leap In Container-Based Threat Detection

Ranga Premsai - Technical fellow in Cybersecurity and identity management. As organizations race to adopt AI-powered applications, the cybersecurity threat landscape is evolving just as rapidly. At the intersection of innovation and risk lies a growing challenge: How do we secure containerized AI workloads that operate with dynamic access privileges and autonomy? Agentic AI systems capable of independent decision-making have emerged not only as a computational advancement, but also as a critical force multiplier in modern cybersecurity. By leveraging agentic AI for container-based threat detection, organizations can move from reactive security to proactive defense, especially within the realm of identity and access management (IAM). As a technical fellow focused on cybersecurity at Bellevue University, this is something I've been involved in for quite some time now, and I'd like to share my insights on the future of agentic AI with you in this article. In today's cloud-native environments, containerization accelerates deployment but complicates security. Each container may spin up with its own permissions, APIs and ephemeral lifespans, creating a perfect storm for lateral movement and privilege escalation attacks if not managed properly. Traditional IAM approaches involving static rules, manual approvals and periodic reviews are no longer sufficient. We need intelligent, real-time systems that adapt as containers launch, communicate and terminate. Unlike traditional AI models trained to recognize patterns within constrained datasets, agentic AI introduces the notion of context-aware autonomy. These agents operate within defined parameters but can make real-time decisions based on behavioral analysis, risk signals and continuous policy evaluation. Imagine a container running a machine learning job suddenly initiating outbound API calls to services outside its scope. An agentic AI engine can detect this behavior, cross-reference it with learned norms and automatically isolate the container—all without human intervention. Integrating agentic AI into a container security model enhances IAM at three critical layers: 1. Behavioral Access Intelligence: Agentic AI models learn normal patterns of access across containers, users and services. Deviations such as privilege creep or suspicious privilege elevation trigger adaptive response actions. 2. Autonomous Policy Enforcement: Instead of relying on static rules, agentic AI refines policies dynamically. For example, if a container suddenly accesses identity stores or credential vaults, the system can quarantine access and prompt step-up authentication. 3. Audit and Explainability: One often overlooked benefit of agentic systems is their ability to explain decisions. This is essential for IAM teams navigating compliance, audit trails and zero-trust initiatives. For security leaders, this isn't just about adopting another AI capability; it's about rethinking access governance in AI-native ecosystems. Agentic AI doesn't replace IAM teams; it empowers them with visibility, agility and control. However, implementation requires careful consideration. During my time in the industry, I've learned that guardrails must be clearly defined to avoid decision-making drift. Governance structures should include review cycles, simulation environments and risk tolerance thresholds. When done right, agentic AI acts not as a rogue decision-maker, but as a trusted security co-pilot. In a world where digital identities are increasingly interwoven with AI operations, agentic AI offers a path forward: secure, autonomous and intelligent IAM that can scale with innovation, agility and resilience. As enterprise infrastructures become more dynamic and AI systems gain greater autonomy, the need for adaptive security frameworks becomes not just important, but essential. Agentic AI can enable us to move beyond static controls and embrace a responsive, risk-aware model of identity governance. As someone deeply engaged in cybersecurity leadership and AI strategy, I believe this approach will define the next generation of intelligent, context-aware access governance will serve as a foundation for trust in tomorrow's cloud-native and AI-driven digital ecosystems. Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?

Strata Identity Launches ‘The Identity Heroes' to Spotlight Real-World IAM Journeys
Strata Identity Launches ‘The Identity Heroes' to Spotlight Real-World IAM Journeys

Business Wire

time2 days ago

  • Business Wire

Strata Identity Launches ‘The Identity Heroes' to Spotlight Real-World IAM Journeys

BOULDER, Colo.--(BUSINESS WIRE)-- Strata Identity, the Identity Orchestration company, today announced the launch of The Identity Heroes, a new video podcast (videocast) series that gives a voice to the people behind some of today's most challenging and impactful identity and access management (IAM) projects. Featuring candid, informal conversations, each episode of The Identity Heroes explores real-world stories, technical lessons, and personal reflections with CISOs, architects, and identity experts. Each 40-minute episode features a relaxed, unscripted conversation focused on each Identity Heroes' professional journey, career-defining projects, challenges and learnings, and their perspective on the road ahead. Share Hosted by Strata's identity experts—including Field CTO Aldo Pietropaolo, VP of Product and Standards Gerry Gebel, and Senior Director of Product Marketing Mark Callahan— The Identity Heroes delves into real-world experiences of some of the industry's leading practitioners and pioneers. The series aims to educate and inspire IAM professionals with actionable insights and perspectives on topics such as modernization, Zero Trust, policy, and resilience. 'No one goes to school for identity, which is why we created The Identity Heroes —to celebrate the real people solving tough problems behind the scenes,' said Aldo Pietropaolo, Field CTO of Strata Identity. 'This videocast isn't about promoting products—it's about surfacing the lessons, breakthroughs, and moments of truth that can help others in the IAM community grow their careers and navigate complex challenges.' Each 40-minute episode features a relaxed, unscripted conversation focused on each Identity Heroes' professional journey, career-defining projects, challenges and learnings, and their perspective on the road ahead. The first three episodes of Identity Heroes featuring Eve Maler, President and Founder of Venn Factory, Sebastian Rohr, CTO of GmbH and Sulohita Vaddadi, CISO of GE Corporate, are now live and available on YouTube, Spotify, and the Strata Identity website, with new episodes released every month. Watch now: About Strata Identity Strata Identity enables organizations to modernize identity providers without disrupting existing infrastructure while maintaining a frictionless user experience. By decoupling identity from applications, Strata's Maverics platform unifies SSO, supports multiple IDPs simultaneously, and ensures continuous access during outages via IDP failover. Led by CEO Eric Olden—co-author of the SAML standard— Strata also created the Identity Query Language (IDQL) and open-source Hexa project to help standardize multi-cloud identity management. Learn more at and follow us on LinkedIn and YouTube.

IAM Maturity Lagging Across Most Organizations, GuidePoint Security Finds
IAM Maturity Lagging Across Most Organizations, GuidePoint Security Finds

Business Wire

time2 days ago

  • Business Wire

IAM Maturity Lagging Across Most Organizations, GuidePoint Security Finds

HERNDON, Va.--(BUSINESS WIRE)--A new report released today by GuidePoint Security, in partnership with the Ponemon Institute, found that most organizations are falling short in their Identity and Access Management (IAM) strategy—leaving them vulnerable to identity-based threats. These findings should serve as a call to action—identity is a primary attack vector and needs to be prioritized. Although 75% of cyberattacks leveraged identity-based threats last year, GuidePoint Security's State of Identity and Access Management (IAM) Maturity Report has unveiled that IAM remains under-prioritized compared to other IT security investments, with most organizations still in the early to mid-stages of IAM maturity. Only half of respondents rate their IAM tools as effective, and even fewer (44%) express high confidence in their ability to prevent identity-based incidents. 'These findings should serve as a call to action—identity is a primary attack vector and needs to be prioritized,' said Kevin Converse, Vice President, Identity and Access Management at GuidePoint Security. 'Many organizations still rely on manual processes and outdated approaches, limiting their ability to manage risk. Achieving IAM maturity means understanding that IAM is more than just an IT function—it's a cornerstone of a robust and proactive security strategy.' The report also highlights significant gaps in IAM technology, expertise and resources—factors that are stalling programmatic maturity and making it more difficult for organizations to secure identities across today's complex environments. Key findings from The State of Identity and Access Management (IAM) Maturity Report include: IAM is underfunded and underdeveloped. Only 50% of respondents believe their IAM tools and investments are effective. Investments in IAM trail behind other security priorities. Manual processes and expertise gaps are barriers to maturity. A lack of appropriate technologies (54%), in-house expertise (52%) and resources (45%) are cited as top challenges to achieving IAM maturity. Many organizations still rely on spreadsheets, scripts and other manual efforts. IAM maturity is a path to enhanced security. A small group (23%) of organizations that have invested in automation and advanced IAM technologies report fewer security incidents and stronger identity controls. They lead in adopting biometric authentication, identity threat detection and integrated governance platforms. IAM implementation is misaligned with security goals. Surprisingly, 45% of respondents say the primary driver for IAM investments is to improve user experience—not security. There is a disconnect in program perception and reality. While most organizations report having policies in place or in development (83%), only 28% have these policies integrated into their IAM platforms. 'IAM touches every application, user and device across the network,' Converse added. 'By treating it as a strategic priority—and investing accordingly—organizations can confidently embrace emerging technologies like AI, minimize risk and accelerate business growth.' The State of Identity and Access Management Maturity Report is based on responses from a comprehensive survey of 625 U.S.-based IT and IT security professionals involved in their organizations' identity and access management program. For more information: About GuidePoint Security GuidePoint Security provides trusted cybersecurity expertise, solutions, and services that help organizations make better decisions that minimize risk. Our experts act as your trusted advisor to understand your business and challenges, helping you through an evaluation of your cybersecurity posture and ecosystem to expose risks, optimize resources and implement best-fit solutions. GuidePoint's unmatched expertise has enabled 40% of Fortune 500 companies and more than half of the U.S. government cabinet-level agencies to improve their security posture and reduce risk. Learn more at

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store