Discover
Secured by Design
Secured by Design
Author: Santosh Subramanian
Subscribed: 0Played: 1Subscribe
Share
© 2025 Secured by Design
Description
Great security solution are designed from the ground up..
Secured by Design is a podcast where Santosh shares practical insights, frameworks, and perspectives on identity security and other aspects of cybersecurity.
Each episode breaks down complex concepts into actionable ideas for professionals protecting digital identities, designing secure systems, and leading security initiatives.
Because true security is built and not bolted on...
6 Episodes
Reverse
Summary In this episode of 'Secured by Design', we discuss the root cause for significant Cloudflare outage that occurred on November 18, 2025, which disrupted major internet services and highlighted the fragility of digital infrastructure. The conversation delves into the causes of the outage, its financial impact on businesses, and the lessons learned regarding cybersecurity and infrastructure reliance. Chapters 00:00 The Financial Impact of the Cloudflare Outage 03:40 The Role of Cloudfl...
Summary In this episode of 'Secured by Design', we delve into Customer Identity and Access Management (CIAM), exploring its significance in enhancing customer experiences while ensuring security and privacy. The discussion highlights the digital experience gap, the differences between CIAM and traditional IAM, and the core concepts that underpin effective CIAM systems. We emphasizes the importance of a seamless customer journey and the future growth potential of CIAM in the digital landscape...
Summary In this episode of Secured by Design, we discuss the growing prevalence of non-human identities (NHIs) in organisations, which outnumber human identities significantly. We highlight the security risks associated with NHIs, including their lack of oversight and the potential for exploitation by attackers. The conversation emphasises the need for organisations to adopt a modern playbook for managing NHIs, especially in light of the increasing integration of AI technologies. We also out...
Summary In this episode of 'Secured by Design', we discusses the critical shift from traditional passwords to passkeys in the realm of cybersecurity. We also highlight the alarming statistics surrounding password breaches and the vulnerabilities they present. The conversation delves into the mechanics of passkeys, their advantages over passwords, and the growing adoption of this technology across various industries. The episode emphasize the importance of transitioning to a passwordless futur...
Summary In this episode of Secured by Design, we delve into the complexities of modern identity governance and administration (IGA). We discuss the challenges organizations face in managing access for a multitude of identities and applications, and how IGA solutions can streamline this process. To explain how a modern IGA solution does this, we follow the journey of an employee, James, from onboarding to offboarding, highlighting the importance of automated workflows, access certi...
Summary In this (First) episode of Secured by Design, we explore the critical role of identity in cybersecurity. We emphasise that identity should be the foundation of security, rather than an afterthought. Through real-world examples, we illustrate the risks associated with poor identity management and the benefits of adopting an identity-first approach. The conversation also highlights the cultural shift needed within organisations to prioritise identity governance and security as a means ...


