Oct. 2022 |
Create an Access Review in Veza in 3 minutes |
vxPhQAO5EK4 |
Oct. 2022 |
Manage Local Account Sprawl with Veza |
bphCCN5wfQg |
Oct. 2022 |
Build a Rule in Veza in 2 minutes |
qFZHSDMoOqI |
Nov. 2022 |
Into the Vezaverse: Veza for Okta |
6oWq8BOo2WQ |
Dec. 2022 |
VezaVerse: Find & eliminate orphaned accounts |
mxvTOxJQfBQ |
Dec. 2022 |
Looking back on 2022 |
vGoNu027M5o |
Jan. 2023 |
Into the VezaVerse: Veza for Slack |
9PhNJIfIsh4 |
Feb. 2023 |
Veza | Google Cloud - data security for multi-cloud environments |
EvkVzc5fD3U |
Feb. 2023 |
Demo - Veza for Data Lake Security |
02fQ3oKdags |
Mar. 2023 |
VezaVerse Find and eliminate direct assignment of apps in your Identity Platform |
LBpE0QHTrAs |
Apr. 2023 |
Rich Dandliker at the 2022 Cyber Security Summit on Authorization |
bp88PeFP39Q |
Apr. 2023 |
Customer Journey - Deluxe Media |
1zpiF9nicEo |
May. 2023 |
Into the VezaVerse: SaaS access security & governance |
ijo1aDAlc5w |
May. 2023 |
History of Hacks: SSRF Attacks on AWS |
opFuxDM2Ee4 |
Jun. 2023 |
History of Hacks: Outmaneuvering MFA |
-cpJvxgAJgI |
Jun. 2023 |
Case Study: How TGen Secures their Data with Identity-First Security |
IiIWG9qp3zk |
Jun. 2023 |
Veza | Choice Hotels’ Identity-First Approach to Secure Enterprise Data |
6BIwT6OC-14 |
Jun. 2023 |
Veza | Bringing the Trust Back Into Zero Trust |
kORCf5HNWmY |
Jul. 2023 |
Customer Journey - Blackstone |
JTiTFShwR10 |
Aug. 2023 |
History of Hacks: Orphaned Accounts |
ihJirKLAYow |
Sep. 2023 |
Veza | Identity Radicals - TRAILER (OFFICIAL): Conversations with cybersecurity experts |
VOoxSqjZh_k |
Sep. 2023 |
Identity Targeting: A Growing Threat | Ep 1, Identity Radicals Podcast |
IIUnNaIaskA |
Oct. 2023 |
Veza | The fundamental question: Who can take what action on what data? |
H0w3QgKP41s |
Oct. 2023 |
Why Veza, Why Now? |
4faJ0KNZMOE |
Oct. 2023 |
Disrupting Breaches and Advancing InfoSec | Ep 2, Identity Radicals Podcast |
be5U7cNiLq8 |
Nov. 2023 |
Decoding Data Sovereignty | Ep 3, Identity Radicals Podcast |
grsw0nUuAh0 |
Dec. 2023 |
Veza Demo - Validate provisioning outcomes in Okta |
SgQ-mF6dlKM |
Jan. 2024 |
Veza for Google Drive |
ALavLadlmuQ |
Jan. 2024 |
Sneak Peek! A Practitioner's Guide to Intelligent Access Book Launch (1/23/2024) |
FVHgz38n2EA |
Feb. 2024 |
Veza + Crowdstrike integration: identify, triage, and remediate threats in minutes |
OH2817FoQSE |
Feb. 2024 |
Identity Security Spotlight - Midnight Blizzard's breach of Microsoft |
UmNaCOzEKqE |
Feb. 2024 |
Identity Security Spotlight - Cisco announces "Identity Intelligence" |
hix7JwQSaG8 |
Feb. 2024 |
Identity Security lessons from Midnight Blizzard's breach of Microsoft |
wN4YPQblfr4 |
Feb. 2024 |
Identity Security Spotlight - Delinea acquires Fastpath |
814mJrdQzak |
Feb. 2024 |
The hard thing about Zero Trust - Tarun Thakur on the challenges of RBAC at scale |
PRwCuwGTrTE |
Feb. 2024 |
The hard thing about Zero Trust - Nicole Perlroth on the NotPetya attack |
cSpsNPb5O4k |
Feb. 2024 |
The hard thing about Zero Trust - Ted Schlein - "Why hack in when you can log in?" |
3_2qHakfTW4 |
Mar. 2024 |
Veza welcomes Mike Towers as Chief Security & Trust Officer |
820CRydTxhU |
Mar. 2024 |
Book Launch! Intelligent Access: Strategies for Achieving Least Privilege in the Modern Enterprise |
ufIZk1v3dN8 |
Apr. 2024 |
Veza | Identity Security Spotlight: Microsoft CISA Investigation |
wfCOzcduxLU |
May. 2024 |
Identity Security Spotlight - Ransomware attack on Ascension |
WgGgw1FXYFs |
Jul. 2024 |
Meet Veza |
B4_7XZnlv8s |
Jul. 2024 |
Veza Demo |
RU8c8-TytgE |
Jul. 2024 |
Who has access to what in Snowflake? |
lH3wG5W_Xvs |
Aug. 2024 |
Customer Journey - Snowflake |
F02vT49EHGA |
Aug. 2024 |
Demo - Veza Access AI |
NV74x3TZYgc |
Aug. 2024 |
Veza launches Access AI |
uGwHOdbYdYQ |
Aug. 2024 |
Veza's Vision |
UHuXIn3MiIE |
Aug. 2024 |
Identity Governance in the Cloud Era | Ep 4, Identity Radicals Podcast |
cJ07oO9gDxw |