
Title: Keys Without People" — John Heasman on Cleaning Up Non-Human Access Summary: John breaks today's non-human identity mess into three buckets: core tools your business runs on, old/one-off integrations that linger, and engineer tokens left behind. His playbook is simple: decide what's truly critical, assign a clear owner, keep access minimal, and review it on a schedule. With AI spawning even more "non-human users," basics done well—prioritize, tighten, rotate, repeat—win the day. This segment is sponsored by Saviynt. Visit https://cisostoriespodcast.com/saviynt to learn more about them! Visit https://cisostoriespodcast.com for all the latest episodes! Show Notes: https://cisostoriespodcast.com/csp-220
Podzilla Summary coming soon
Sign up to get notified when the full AI-powered summary is ready.
Free forever for up to 3 podcasts. No credit card required.

IAM for MSSPs: The Hidden Risk of Blind Trust - Dustin Sachs - CSP #224

Cloud Security: The AI Effect & How to Proceed - Richard Marcus - CSP #223

From Alerts to Action: Making Public–Private Threat Intel Actually Useful - Ian Washburn - CSP #222

Beyond Vendor Risk: Real-Time GRC, AI, and Protecting App User Data - Jadee Hanson - CSP #221
Free AI-powered recaps of CISO Stories Podcast (Audio) and your other favorite podcasts, delivered to your inbox.
Free forever for up to 3 podcasts. No credit card required.