Identity at the Center podcast

#367 - RSM & IDAC Present - The Intersection of Attack Surface Management and Identity

0:00
51:47
Rewind 15 seconds
Fast Forward 15 seconds

Join hosts Jeff Steadman and Jim McDonald as they explore the critical intersection of attack surface management (ASM) and digital identity with Dan Lauritzen, Director with RSM Defense - RSM’s Managed Security Team. This episode dives deep into how identity has become a key component of your organization's attack surface and why breaking down silos between identity teams and Security Operations Centers is more crucial than ever.

Dan brings a unique perspective from his military background as a human intelligence collector to his current role in detection and response. Learn about the cyber kill chain, understand when you might have too much data, and discover practical strategies for treating identities as assets that need continuous protection.

Whether you're an identity practitioner looking to expand your security knowledge or a cybersecurity professional wanting to better understand identity's role in attack surface management, this conversation offers valuable insights and actionable takeaways.

Key topics include XDR platforms, ITDR tools, the evolution from legacy SIEM to modern detection systems, and why the future of security requires collaboration between traditionally separate teams.


Chapter Timestamps

00:00 - Introduction and Industry Trends

01:00 - AI and Technology Disruption Discussion

02:00 - Upcoming Conference Schedule and Discount Codes

04:00 - Podcast Milestone - Approaching One Million Downloads

06:30 - Introducing Dan Lauritzen and RSM Defense Team

09:00 - Dan's Background - From Military to Cybersecurity

12:00 - What is Attack Surface Management?

14:00 - Treating Identities as Assets

16:00 - The Cyber Kill Chain Explained

18:00 - Why Identity and SOC Teams Operate in Silos

21:00 - The Role of Data in Modern Security Operations

23:00 - Continuous Identity Management and Shared Signals Framework

26:00 - Can You Have Too Much Data?

29:00 - Breaking Down Silos Between Identity and SOC Teams

32:00 - Practical Collaboration Strategies

34:00 - SIEM vs XDR vs ITDR - Understanding the Tool Landscape

41:00 - Pragmatic Security Strategies and Metrics

44:00 - Biggest Misconceptions About Attack Surface Management

45:00 - Military Background - Human Intelligence Collection

48:00 - Communication Tips for Better Information Gathering

51:00 - Closing and Contact Information


Connect with Dan: https://www.linkedin.com/in/daniel-lauritzen-67545045/

Cyber Kill Chain: https://en.wikipedia.org/wiki/Cyber_kill_chain

Learn more about RSM:


Connect with us on LinkedIn:

Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/

Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/


Visit the show on the web at http://idacpodcast.com


Keywords

IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, Dan Lauritzen, RSM, attack surface management, cybersecurity, digital identity, SOC, Security Operations Center, XDR, ITDR, SIEM, cyber kill chain, detection and response, identity security, human intelligence, military cybersecurity, continuous identity management, shared signals framework, UEBA, threat detection, zero trust, privileged access management, identity governance, security metrics, vendor management, cloud security, endpoint security, data correlation, security silos, collaboration strategies, identity assets, orphaned accounts, entitlement creep, attack surface reduction, security automation, AI in security, machine learning security, identity sprawl, security tools, cybersecurity consulting, managed security services, security monitoring, incident response, threat hunting, vulnerability management, risk assessment, compliance, security architecture, defense strategy


More episodes from "Identity at the Center"