![]() |
The Identity Jedi Show: Where Identity Meets StrategyAuthor: David Lee Sameer Sait Identity Jedi Show
The Identity Jedi Show brings bold insights on identity and access management (IAM), cybersecurity, and modern identity strategy. Hosted by David Lee and Sameer Sait each episode features expert interviews, real-world tactics, and unfiltered takes on IAM, Zero Trust, identity governance, and AI-driven security. Whether youre a CISO or identity practitioner, this podcast helps you simplify complexity and lead with impact. Subscribe and level up your identity game. Language: en-us Contact email: Get it Feed URL: Get it iTunes ID: Get it |
Listen Now...
Understanding the Critical Role of Identity in Cybersecurity
Episode 16
Tuesday, 11 November, 2025
Identity is the heart of cybersecurity.In this episode of The Identity Jedi Show, we sit down with Dutch — former senior advisor at Raytheon and AWS, now VP of Cloud Services — and Joe Palmer, Chief Innovation Officer at iProov, to unpack how identity and security are converging faster than ever.Together, we explore:🔹 Why identity is the new security perimeter🔹 How biometrics and AI are reshaping trust in digital ecosystems🔹 The challenges of vendor consolidation and what it means for enterprise defenders🔹 How leaders can build resilient, identity-first security strategiesWhether you’re an Identity Architect, Security Engineer, or CISO, this roundtable delivers real-world insights from experts shaping the future of identity-driven cybersecurity.💬 Question for You: How do you see AI and biometrics changing your approach to identity security in the next 2 years? Drop your thoughts below 👇🏾🔔 Subscribe to The Identity Jedi Show — where we talk about the future of identity, security, and everything in between.Check out our episode sponsorhttps://www.iproov.com00:00 Introduction and Welcome00:34 Round Table Guest Introductions01:57 The Importance of Identity in Security05:57 Challenges in Identity Verification08:19 The Rise of Biometric Solutions19:28 Account Recovery and Social Engineering21:38 Industry Trends and Consolidation27:07 Problem-Solving and Empowerment in Security28:07 Technological Advancements and Deep Fakes28:59 The Evolution of Cloud Computing and Security32:00 Identity Verification and Digital IDs38:32 Balancing Security Platforms and Vendor Management44:07 The Importance of Identity in Security49:42 Final Thoughts and Parting Shots












