Ep. 1- SDLC Governance with BlueFlag Security

Transcript

Related insights

Webinar

From SailPoint IdentityIQ to Identity Security Cloud: Creating Value with Cloud

Migrating from SailPoint IdentityIQ to Identity Security Cloud (ISC) offers significant benefits including reduced total cost of ownership, faster deployment, continuous updates with no downtime, and AI-driven security insights. This migration leverages existing investments while enabling scalable, cloud-native identity security that enhances visibility, risk detection, and operational efficiency.
Webinar

Transform Your Security Strategy with Microsoft Sentinel and a Modern Managed SOC

Enhance your organization's security posture with Microsoft Sentinel, a cloud-native SIEM powered by AI and automation, integrated with Microsoft Defender and Entra ID signals. This webinar demonstrates how a modern Security Operations Center (SOC) with 24x7 monitoring can provide improved threat detection, faster response times, and comprehensive digital estate protection.
Webinar

The Great Convergence: Bridging the Gap Between Identity and App Governance

Discover how the identity and application governance vendor landscape is evolving amid rapid market convergence. This webinar explores best practices for extending SoD frameworks to ERP and cloud environments, managing role remediation, and integrating application governance with privileged access management to optimize business services.
Webinar

Maximizing Value, Showcasing Success, and Future-Proofing Your Identity Program

Maximize the value of your identity program and showcase its business impact to leadership for sustained budget support. This on-demand webinar reveals five key strategies to accelerate time to value, improve compliance performance, and future-proof your identity program against market disruptions and evolving challenges.
Webinar

Introduction to Microsoft’s Security Service Edge for Identity-Centric Network Access

Unlock seamless, secure access to apps and resources anywhere with Microsoft's identity-centric Security Service Edge (SSE) solution, integrating Entra Internet Access, Entra Private Access, and Defender for Cloud Apps. This webinar explores how unified Conditional Access policies and Zero Trust principles streamline network security while enhancing user experience for modern cloud and mobile workforces.
Webinar

Modernizing GRC: How to Mitigate Risk in Hybrid Cloud Environments

Modernize your Governance, Risk, and Compliance (GRC) strategy to effectively mitigate risk in hybrid cloud environments across multiple ERP systems like Oracle, SAP, and Microsoft Dynamics. This on-demand webinar explores market trends, SoD risk management, converged IGA and GRC platforms, and the use of AI to enhance audit efficiency and reduce compliance gaps.
Webinar

How to Bolster Security and Create Business Value Through Third-Party IAM

Extending Identity and Access Management (IAM) to third parties and non-employees enhances security while unlocking business value through streamlined vendor lifecycle, delegated administration, and relationship management. Learn strategies to address governance, audit requirements, and stakeholder engagement for a successful third-party IAM program.
Webinar

Fortifying Your Cyber Defenses: Using Microsoft Defender to Prevent Token Theft and AiTM Attacks

Explore strategies to defend against token theft and adversary-in-the-middle (AiTM) attacks using Microsoft Defender and Sentinel. It covers attack mechanics, their impact, and demonstrates detection and response techniques to enhance an organization’s cybersecurity posture.
Webinar

How to Demonstrate Success and Grow the ROI of CIAM Programs

Successful CIAM programs drive revenue growth by improving customer experiences and protecting against fraud. Measuring CIAM success involves tracking key metrics such as user adoption, conversion rates, security incident reduction, and leveraging analytics to optimize the customer journey and demonstrate business value.
Webinar

Configuring and Using Custom Claims in Microsoft Entra ID

Microsoft Entra ID (formerly Azure AD) enables configuration of custom claims to enhance authentication and authorization workflows by providing additional data in tokens. This webinar covers how to set up and use custom claims in SAML, ID, and access tokens to deliver tailored application experiences and enforce fine-grained access controls.
Webinar

Control your Cloud: Mastering Least Privilege with CIEM

Cloud Infrastructure Entitlement Management (CIEM) helps establish and maintain least privilege across multi-cloud environments by providing centralized visibility and control over cloud entitlements. This webinar covers CIEM best practices, security framework standardization, entitlement cleanup with analytics, and how CIEM lays the foundation for posture management and DevSecOps.
Webinar

Who Gives a Sh*t About Identity Security – How to Create Business Value from IAM

Identity and Access Management (IAM) programs create business value by streamlining secure user access, reducing risks such as credential theft, and improving operational efficiency across departments. By defining common business outcomes and building leadership support, organizations can protect budgets, foster program champions, and leverage AI to enhance IAM’s impact on HR, marketing, and other teams, driving meaningful organizational transformation.
Webinar

Using Microsoft Entra Verified ID for Identity Proofing of Partners, Customers, and Employees

Microsoft Entra Verified ID enables continuous, secure identity proofing for partners, customers, and employees across hybrid work and distributed environments. This webinar explores common use cases such as onboarding and help-desk verification, explaining how Verified ID enhances security by validating identity attributes and roles with verifiable credentials.
Webinar

Understanding Privileged Access Management (PAM)

Privileged Access Management (PAM) is essential for protecting organizations against data breaches by controlling, monitoring, and securing privileged accounts with just-in-time, least privilege access. This webinar provides an overview of PAM and Privileged Identity Management (PIM), covering use cases, compliance support, and solution capabilities like Saviynt CPAM and Microsoft Entra ID PIM to strengthen cybersecurity posture effectively.
Webinar

The Rise of AI Threats: Identity Management

Explore how artificial intelligence is creating new and sophisticated threats to identity management systems and discover strategies to mitigate these risks. This webinar examines AI-enabled impersonation techniques, deepfake risks, and how cybercriminals leverage AI, along with practical steps organizations can take to protect identities in an evolving threat landscape.
Webinar

Transitioning from the MIM Portal to Microsoft Entra ID: MIM Retirement Series Part 2

Modernize your identity strategy by transitioning from the Microsoft Identity Manager (MIM) Portal to Microsoft Entra ID while maintaining existing on-premises synchronization with the MIM sync engine. This webinar explores how to leverage Entra ID’s advanced self-service, automated workflows, and governance capabilities without disrupting hybrid environments, featuring practical guidance and real-world migration examples.

Ep. 1- SDLC Governance with BlueFlag Security

September 25, 2025
|
Duration:
50 mins
About This Talk

Transcript

Speakers
No items found.

Related insights

Identicast

Ep. 2 - Dynamic Cloud PAM with Britive

We discuss DynamiWe talk Cloud Privileged Access Management with Nauman Mustafa of Britive.
Identicast

Ep. 3 - The Convergence of App Governance and Identity Security with Delinea

We discuss the convergence of application governance and identity security with Frank Vukovits of Delinea.
Identicast

Ep. 5 - Identity Threat Detection & Remediation with Hydden

We chat with Tyler Croak of Hydden.io to discuss improving security posture through Identity Threat Detection & Remediation.

Ep. 1- SDLC Governance with BlueFlag Security

September 25, 2025
|
Duration:
Intro

Recent insights

Success Story

Saying Goodbye to ADFS: Migrating a Federal Agency to Microsoft Entra ID for a Zero Trust, Cloud-First Future

Oxford Computer Group, a MajorKey Technologies Company, helped a large federal agency migrate from ADFS to Microsoft Entra ID to improve security and streamline authentication processes.
Success Story

Streamlining Access Reviews and Identity Governance with Saviynt EIC for a Large Retailer

A large apparel retailer partnered with Oxford Computer Group, a MajorKey Technologies Company, to help lay the foundation for a robust identity governance infrastructure.
Success Story

Helping Community Colleges Improve Security with Microsoft 365 Security Services

Enabling robust and evolving security solutions with Microsoft Entra ID and Microsoft 365 Security Services for a large network of community colleges.
Success Story

Consolidating Identity Processes, Improving Security, and Reducing Costs with Microsoft Entra ID Governance

For healthcare organizations, Microsoft Entra ID Governance provides an opportunity to consolidate identity management processes, improve security, and reduce IT infrastructure costs.
Success Story

A Modern, Scalable IGA Solution for a Large Healthcare Network

Migrating to Microsoft Entra ID Governance to consolidate identity and security solutions for reduced risk and streamlined processes.
Success Story

Recovering a CyberArk Implementation for a Healthcare FinTech Leader

Learn how MajorKey helped a healthcare technology company overcome a stalled CyberArk implementation to achieve full PAM adoption.
Success Story

Transforming Privileged Access Management with CyberArk

Modernizing privileged access management for a public sector technology team
Success Story

Identity Integration and Consolidation Post Acquisition

Oxford Computer Group, a MajorKey Technologies company, developed and implemented a streamlined template for integrating identity systems after acquisitions.
Success Story

Retailer Updates Separation of Duty Rulesets to Maintain SOX Compliance

MajorKey updated the client's FastPath instance to help them pass SOX audit and find maximum value following changes to their internal business processes.
Success Story

Top Ranked Children's Hospital Automates New User Processing - Saving 2,600 Hours Provisioning New Users Annually

The MajorKey team fully automated the user creation process with SailPoint IdentityIQ, saving 2,600-man hours annually while reducing security risks.
Success Story

Supply Chain Company Mitigates Risk Exposure and Reduces Process Time by Automating User Non-Starts Instantly

The customer was experiencing significant inefficiencies around governing user non-starts. Due to the manual nature of their process, every non-start would take several days to complete.
Success Story

Online restaurant-reservation service gains cloud visibility and a least-privilege identity strategy

Over-privileged accounts and lack of visibility lead to increased security risk and possible increased cloud costs.
Success Story

Helping a Fortune 500 Bank Get SailPoint Back on Track

MajorKey rescued a stalled SailPoint implementation at a Fortune 500 bank after two previous integrators failed to deliver, resolving key configuration issues and streamlining application onboarding. Their program-level approach enabled onboarding hundreds of applications simultaneously, saving significant time and resources while restoring client confidence.
Success Story

Rescuing Stalled FastPath Deployment at a Food & Beverage Manufacturer

The client was running into issues with their FastPath implementation partner and struggling to make progress until MajorKey got it over the finish line.
Success Story

Advising and Implementing Governance to Help Customer Go Public

MajorKey helped a global food and beverage manufacturer establish Application Governance controls to meet SOX requirements in order to go public.
Success Story

From Three Days to Three Minutes: Accelerating New User Onboarding at a Major US Municipal Hospital System

MajorKey accelerated user onboarding and offboarding at a major US municipal hospital system from days to minutes by fully automating the processes. This transformation improved operational efficiency, enhanced security by reducing risk exposure, and enabled the healthcare organization to scale identity access management with confidence.
Redirection linkRedirection linkRedirection link
No items found.
No items found.
No items found.