
#AuditTuesday GRC Podcast
Every Tuesday we're sharing valuable content for you with the leading authorities in GRC, Compliance and Identity Security.
Episodes
65 episodes
#AuditTuesday - AI Governance and Model Risk Management w/ James Sayles
As artificial intelligence reshapes business, compliance, and security landscapes, organizations are under pressure to implement clear governance strategies. Yet, many lack a roadmap for ethical, secure, and compliant AI deployment.In t...
•
Season 3
•
Episode 6
•
44:18

MSPs and GRC (Governance Risk and Compliance) w/ Shannon Noonan and Daniel Morrison
Governance Risk and Compliance is a $45.6B market - a market the Managed Service Providers (MPSs) need to be in they want to grow.But GRC, the concept of helping enterprises obtain not only compliance but be able to show proper governanc...
•
Season 3
•
Episode 5
•
50:21

Shared Signals - What They Mean for Authorization
Shared Signals - for those in the identity know - it’s a subject that time has come.Shared Signals refers to a standardized system where organizations can exchange real-time security information about users across different platforms.
•
Season 3
•
Episode 4
•
41:46

Reviewing Privileged Accounts - with Synoptek MSP
Privileged users are the source of most enterprise problems: from outsider attacks, insider threads and compliance - the focus usually involves admin accounts.These accounts have to be reviewed - and on a regular basis. How...
•
Season 3
•
Episode 3
•
45:39

EU's DORA and Identity Governance - with Ralph Menegatti from concedro
Huge regulatory changes face the EU nations and the companies that work w/ the EU: Digital Operational Resilience ACT (DORA). The Digital Operational Resilience Act (Regulation (EU) 2022/2554) solves an important problem in the EU...
•
Season 3
•
Episode 2
•
51:23

Automating AWS Entitlement Reviews - with CloudArmee
AWS is the premier cloud vendor - AWS is the basis of most enterprises cloud strategy. To help us understand the importance of AWS and AWS entitlements, YouAttest has partnered with CloudArmee, prominent AWS experts....
•
Season 3
•
Episode 1
•
31:48

CMMC 2.0 Ruling - What Does this Mean? With ShortArm Solutions
The U.S. Department of Defense (DoD) on October 15th, 2024 published its long-anticipating first part of the final rule (32 CFR) for the Cybersecurity Maturity Model Certification (CMMC) program. The program will require third-part...
•
Season 2
•
Episode 43
•
37:34

The Trump Administration and Cyber Regulations - Karen Klever, Mike Andrewes and Stacey Cameron
New administration - new attitude, regulations, priorities on cyber governance? No question.But what will it be? What about CISA?What about NIST?What about the SEC?What about CMMC?<...
•
Season 2
•
Episode 42
•
56:04

Okta “No Password Flaw” - What Is It? How to Secure? - Featuring Greg Kutzbach
Okta announced that they had a flaw in their authentication - where under “specific circumstances” a user could gain access w/o inputting the password associated with the account.How is this possible?What does this mean?...
•
Season 2
•
Episode 41
•
30:57

Mentoring the Next-Generation of Cyber Professionals - Featuring Ted Alben
You can’t talk about cyber security with a professional today without the conversation turning to the topic of the next generation.Namely our youth - with questions coming up,Are they ready for jobs in cyber security?A...
•
Season 2
•
Episode 40
•
14:57

CMMC 2.0 Final Ruling - What Does This Mean? Featuring Michael Andrewes, Yastis
The U.S. Department of Defense (DoD) on October 15th, 2024 published its long-anticipating first part of the final rule (the Final Rule) for the Cybersecurity Maturity Model Ceritficat (CMMC) program.The program will require third-party ...
•
Season 2
•
Episode 39
•
12:30

GRC Fatigue and What Can Be Done - Featuring Stacey Cameron
Practically all enterprises are under some sort of IT compliance and regulations. Holding any data that is classified as sensitive - puts the enterprise under the watchful eye of of the regulators.But with all this compliance and ...
•
Season 2
•
Episode 38
•
13:28

German Cyber Hacks and EU DORA - Featuring Ralf Mennegatti
Cyber Attacks are worldwide. Germany is not immune to these attacks. In fact Deutsche Bank in September 2024, stated that “Cyber-attacks alone cost the German economy an enormous 148 billion euros every year.”At the same time Germa...
•
Season 2
•
Episode 37
•
10:14

MSPs: Automate Your Identity Audits
This YouAttest podcast highlights the YouAttest offering for Identity security and compliance for managed service providers (MSPs.)Automating and simplifying user access reviews.
•
Season 2
•
Episode 36
•
12:03

HR-IAM Variance - Detecting Orphan Users and Privileges w/ YouAttest
HR systems for many enterprises is the identity store of record (ISoR). This is where identities are created, roles are assigned, and privileges are entitled. But these HR systems (HRS) are NOT enforcement points – they are the con...
•
Season 2
•
Episode 35
•
13:34

CMMC 2.0 Final Ruling Update - Yastis, Micahel Andrewes
The U.S. Department of Defense (DoD) on October 15th, 2024 published its long-anticipating first part of the final rule (the Final Rule) for the Cybersecurity Maturity Model Ceritficat (CMMC) program.The program will require third-party ...
•
Season 2
•
Episode 34
•
12:31

The Change Healthcare Hack - A Game Changer in Health Risk Management w/ Greg Kutzbach
Change Healthcare announced Thursday, Feb 29th that a ransomware group that had claimed responsibility for the attack was at faultHealth care providers across the country are reeling from a cyberattack on a massive U.S. health care...
•
Season 2
•
Episode 33
•
55:03

AWS - In-Depth Entitlement Audit by YouAttest w/ Raj Sawhney (CDW)
AWS is the premier IAAS vendor - AWS is the basis of most enterprise cloud strategy. To help us understand the important of AWS and AWS entitlements the video has Raj Sawhney, Mana...
•
Season 2
•
Episode 32
•
17:09

GRC Fatigue and What Can Be Done w/ Stacey Cameron (CyCam Strategies)
Practically all enterprises are under some sort of IT compliance and regulations. Holding any data that is classified as sensitive - puts the enterprise under the watchful eye of of the regulators.But with all this compliance and...
•
Season 2
•
Episode 31
•
13:28

German Cyber Hack and EU DORA w/ Ralf Mennegatti
Cyber Attacks are world-wide. Germany is not immune to these attacks. In fact Deutsche Bank in Sept 2024, stated that “Cyber-attacks alone cost the German economy an enormous 148 billion euros every year.”At the same time Ge...
•
Season 2
•
Episode 30
•
10:15

MSPs: Automate Your Identity Audits w/ YouAttest "User Access Reviews" (UARs)
Welcome to today’s AuditTuesday - this YouAttest podcast highlights the YouAttest offering for Identity security and compliance for managed service providersTo help with the discussion we have
•
Season 2
•
Episode 29
•
12:03

HR-IAM Variance - Cleaning out Orphaned and Mis-Aligned Privileges, w/ Karina Klever
HR systems for many enterprises is the identity store of record (ISoR). This is where identities are created, roles are assigned, and privileges are entitled. But these HR systems (HRS) are NOT enforcement points – they are the co...
•
Season 2
•
Episode 28
•
13:34

CPF Coaching: YouAttest Product of the Week for MSPs - Christophe Foulon
Lots of products out there for MSPs to review and deploy - that’s why the market appreciates those that review the products for the consultants and managed service providers.This is exactly what Christophe Foulon and CPF Coaching did.
•
31:13

Getting Started w/ Your Compliance Project - Karina Klever and Cloud PSO
Most enterprises are under compliance, be it in healthcare, finance, insurance, government, education or defense.And most of the enterprises have compliance projects that need to be started or re-started. And thus the quandary... how to...
•
Season 2
•
Episode 28
•
47:51

YouAttest Next-Gen IGA on AWS Marketplace w/ Cloud Armee (Chris Kesik)
AWS is the predominant cloud service for most enterprises w/ over $90B a year and growing.Which warrant security products that are not only designed to work in the AWS marketplace, but could be sold on the AWS marketplace.That’s...
•
Season 2
•
Episode 27
•
26:53
