Media:
English
Navigation:
English
Please enter your search term
Sign In
Queue
Favorites
Cloud TV
FreeAir.tv Channels
My Library
A-la-carte Subscriptions
History
My Account
My Devices
Earn Cash
Help
International TV
Films
Packages
Video
Audio
Radio
Kids
The PSN Podcast is dedicated to both the amateur and professional recording musician. It features news, talk, interviews and reviews on all topics related to the performing and recording of audio and video.
Join us every week for interesting insights, tips and tricks from inside the music business. The show is highly interactive and we encourage you to e-mail us with what you'd like to see on the show or questions you'd like us to answer.
Would you like to be a guest? Would you like us to play a cut from your latest project? Drop us a line and let us know why our listeners would like to hear what you have to say or play!
http://ProjectStudioNetwork.com
E-mail: hosts@ProjectStudioNetwork.com
Phone: (928) 395-1343
Project Studio Network Recording Podcast
In this commercial real estate podcast, Starboard broadcasts local, national and international commercial real estate news, interviews, stories, and weekly vacancy reports, recently listed hot properties focusing primarily on the San Francisco Bay Area market.
Podcast - Starboard TCN Worldwide CRE
A candid discussion of guitarists, guitars and the guitar community.
Six String Bliss
SwineCast: Regular updates and entertainment on and about the pork industry. Your Connection. At Your Convenience. (tm)
SwineCast
Authors On Tour - Live! features weekly podcasts of authors discussing and reading from their books while on tour and visiting The Tattered Cover Book Store, one of the best independent book stores in the nation.
Authors On Tour - Live!
Random Observations on Art, Photography, and the Creative Process. These short 2-4 minute talks focus on the creative process in fine art photography. LensWork editor Brooks Jensen side-steps techno-talk and artspeak to offer a stimulating mix of ideas, experience, and observations from his 35 years as a fine art photographer, writer, and publisher. Topics include a wide range of subjects from finding subject matter to presenting your work and building an audience. Brooks Jensen is the publisher of LensWork, one of the world's most respected and award-winning photography publications, known for its museum-book quality printing and luxurious design. LensWork is sold in over 1500 stores in the USA and has subscribers in 62 countries. His latest books are "Letting Go of the Camera" (2004) and "Single Exposures" (2005).
LensWork - Photography and the Creative Process
This is the Nosheteria, kind of like a cafeteria, where bites on food are served up to you like little morsels of goodness. Here you'll get a little bit of everything, the occasional recipe, the amusing observation, and the always entertaining story about my life (you're expected to care) in food. Haute cuisine for the masses!
Nosheteria Podcast
Identity Management Series – Workflows Part 5: Wrapping Up
Training
USA
Investing & Finance
About
Discover in
Share
Playing on
This month, we focused on one of the key functionalities of identity management – workflows. Specifically, Provisioning and deprovisioning (which I abbreviate as de/provisioning) Non-employee management User and access recertification These workflows build on each other – it’s necessary to identify how access is de/provisioned before any recertification can be set up, because ultimately once [...]
Related posts:
Vacancy Management and Hierarchies Part 5: Wrapping Up
Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – HR as a Source of Record Part 5: Reliability and Accessibility
0 views
North America \ USA
Audio Books \ Bussines \ Investing & Finance
Video \ Training
Direct link
Playing on all devices
Most Popular
Newer Episodes
Older Episodes
Most Popular
Most Recent
Most Viewed
The Security Catalyst
In the previous segments, we focused on special-case transfers that may be hard to recognize. At the macro level, when a user transfers between HR systems, a legitimate transfer can be mistaken for a termination, leading to poor customer service (and the trouble that ensues). At the micro level, when a user transfers within a [...]
Related posts:Identity Management Series – Termination and Transfer Gotchas Part 2: Transfers Within a Department
Identity Management Series – Termination and Transfer Gotchas Part 1: Transfers and Multiple HR Systems
Identity Management Series – HR as a Source of Record Part 4: Terminations
Identity Management Series – Termination and Transfer Gotchas Part 3: Terminating Employment vs. Terminating Access
In the first segment, we looked at one extreme of transfers – a job change entailing a move between HR systems. In this segment, we’ll look at the other extreme of transfers – a job change that may fall under the HR radar. When we talked about the implications of HR as a source of [...]
Related posts:Identity Management Series – HR as a Source of Record Part 3: Transfers
Identity Management Series – Role- and Rule-Basing Part 1: Introduction
Identity Management Series – Role- and Rule-Basing Part 2: Identifying & Prioritizing Enterprise Roles
Identity Management Series – Termination and Transfer Gotchas Part 2: Transfers Within a Department
In the previous series, we started prepping for the key workflows that make an IAM implementation worth the cost and effort. Implementing workflows effectively is critical to achieving the desired value in terms of time savings and effort/cost reductions. It also gets the organization excited about IAM and makes them willing to keep maturing the [...]
Related posts:Identity Management Series – HR as a Source of Record Part 3: Transfers
Identity Management Series – HR as a Source of Record Part 1: Overview and Approach
Identity Management Series – HR as a Source of Record Part 4: Terminations
Identity Management Series – Termination and Transfer Gotchas Part 1: Transfers and Multiple HR Systems
Faced with the choice between changing one’s mind and proving that there is no need to do so, almost everyone gets busy on the proof. ~John Kenneth Galbraith We set out in January to live and explore full time in an RV. We challenged ourselves; we challenged our notions of nearly everything about modern life [...]
Related posts:Why people are not the problem and where to look (hint: grab a mirror)
Why the definition of awareness matters
How can The Catalyst Method™ benefit your efforts?
The wheels are turning… you ready to roll with the catalyst?
This month, we focused on one of the key functionalities of identity management – workflows. Specifically, Provisioning and deprovisioning (which I abbreviate as de/provisioning) Non-employee management User and access recertification These workflows build on each other – it’s necessary to identify how access is de/provisioned before any recertification can be set up, because ultimately once [...]
Related posts:Vacancy Management and Hierarchies Part 5: Wrapping Up
Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – HR as a Source of Record Part 5: Reliability and Accessibility
Identity Management Series – Workflows Part 5: Wrapping Up
This month, we focused on one of the key functionalities of identity management – workflows. Specifically, Provisioning and deprovisioning (which I abbreviate as de/provisioning) Non-employee management User and access recertification These workflows build on each other – it’s necessary to identify how access is de/provisioned before any recertification can be set up, because ultimately once [...]
Related posts:Vacancy Management and Hierarchies Part 5: Wrapping Up
Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – HR as a Source of Record Part 5: Reliability and Accessibility
Identity Management Series – Workflows Part 5: Wrapping Up
In the previous segment, we worked through the non-employee management workflows. These are a special-case of user recertification and relatively less complex, making them a good place to start. Having built some experience and achieved a quick-win, we’ll now move on to discuss the full user and access recertification workflows. This has become a key [...]
Related posts:Identity Management Series – Role- and Rule-Basing Part 1: Introduction
Identity Management Series – Role- and Rule-Basing Part 4: Documentation and Approval
Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – Workflows Part 4: User/access recertification
In the previous segment, we worked through the non-employee management workflows. These are a special-case of user recertification and relatively less complex, making them a good place to start. Having built some experience and achieved a quick-win, we’ll now move on to discuss the full user and access recertification workflows. This has become a key [...]
Related posts:Identity Management Series – Role- and Rule-Basing Part 1: Introduction
Identity Management Series – Role- and Rule-Basing Part 4: Documentation and Approval
Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – Workflows Part 4: User/access recertification
In the previous segment, we worked through the de/provisioning workflows. These are foundational to the non-employee management workflows in that a key objective of the non-employee management workflows is to terminate access when the non-employee departs. Without the de/provisioning workflows to trigger manual or automated tasks for access removal, the timely knowledge of a non-employee’s [...]
Related posts:Identity Management Series – Workflows Part 2: Provisioning and Deprovisioning
Identity Management Series – Workflows Part 1: Introduction
Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – Workflows Part 3: Non-Employee Management
In the previous segment, we worked through the de/provisioning workflows. These are foundational to the non-employee management workflows in that a key objective of the non-employee management workflows is to terminate access when the non-employee departs. Without the de/provisioning workflows to trigger manual or automated tasks for access removal, the timely knowledge of a non-employee’s [...]
Related posts:Identity Management Series – Workflows Part 2: Provisioning and Deprovisioning
Identity Management Series – Workflows Part 1: Introduction
Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – Workflows Part 3: Non-Employee Management
In this month’s Introduction, three workflow sets were introduced: Provisioning and deprovisioning (which I abbreviate as de/provisioning) Non-employee management User or access recertification This segment explores the first of these, de/provisioning) De/provisioning is the most common of IAM workflows. Done right, this workflow delivers tremendous ROI, improved audit results and improved customer satisfaction by significantly [...]
Related posts:Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – HR as a Source of Record Part 2: New Hires
Identity Management Series – Role- and Rule-Basing Part 3: Designing and Testing IT Roles
Identity Management Series – Workflows Part 2: Provisioning and Deprovisioning
In this month’s Introduction, three workflow sets were introduced: Provisioning and deprovisioning (which I abbreviate as de/provisioning) Non-employee management User or access recertification This segment explores the first of these, de/provisioning) De/provisioning is the most common of IAM workflows. Done right, this workflow delivers tremendous ROI, improved audit results and improved customer satisfaction by significantly [...]
Related posts:Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – HR as a Source of Record Part 2: New Hires
Identity Management Series – Role- and Rule-Basing Part 3: Designing and Testing IT Roles
Identity Management Series – Workflows Part 2: Provisioning and Deprovisioning
We started developing workflows in last month’s activity to manage vacancies. Relatively speaking, vacancy management workflows are comparatively simple and provide business-relevant quick-wins, which give credence to the IAM program. Since a full IAM implementation is typically a multi-year process, being able to point to tangible benefits along the way (other than, “hey – check [...]
Related posts:Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – Role- and Rule-Basing Part 1: Introduction
Identity Management Series – HR as a Source of Record Part 2: New Hires
Identity Management Series – Workflows Part 1: Introduction
We started developing workflows in last month’s activity to manage vacancies. Relatively speaking, vacancy management workflows are comparatively simple and provide business-relevant quick-wins, which give credence to the IAM program. Since a full IAM implementation is typically a multi-year process, being able to point to tangible benefits along the way (other than, “hey – check [...]
Related posts:Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – Role- and Rule-Basing Part 1: Introduction
Identity Management Series – HR as a Source of Record Part 2: New Hires
Identity Management Series – Workflows Part 1: Introduction
What can grocery-shopping carts teach us about building awareness and influencing behavior change? Turns out perhaps more than imagined. During a recent hotel stay, I took a trip to a local grocery store to buy some snacks. I pulled into the lot, parked and headed to the store. Since I only needed a few items, [...]
Related posts:Why the definition of awareness matters
RV Adventure inspired Awareness that Works™
Into the Breach – Audio Series – Chapter 9 (Extending the Conversation: Rewards Beyond Protecting Information)
What a shopping carts reveals about awareness
What can grocery-shopping carts teach us about building awareness and influencing behavior change? Turns out perhaps more than imagined. During a recent hotel stay, I took a trip to a local grocery store to buy some snacks. I pulled into the lot, parked and headed to the store. Since I only needed a few items, [...]
Related posts:Why the definition of awareness matters
RV Adventure inspired Awareness that Works™
Into the Breach – Audio Series – Chapter 9 (Extending the Conversation: Rewards Beyond Protecting Information)
What a shopping carts reveals about awareness
This month we focused on vacancy management, shifting from the functions of identity manager to role manager. Vacancy management is difficult to control manually – in many cases an approval or ownership function is a minor part of someone’s job, so the task of finding a replacement when there is a transfer or termination often [...]
Related posts:Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Vacancy Management and Hierarchies Part 4: Cost Center Ownership
Vacancy Management and Hierarchies Part 3: Data/Access Ownership
Vacancy Management and Hierarchies Part 5: Wrapping Up
This month we focused on vacancy management, shifting from the functions of identity manager to role manager. Vacancy management is difficult to control manually – in many cases an approval or ownership function is a minor part of someone’s job, so the task of finding a replacement when there is a transfer or termination often [...]
Related posts:Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Vacancy Management and Hierarchies Part 4: Cost Center Ownership
Vacancy Management and Hierarchies Part 3: Data/Access Ownership
Vacancy Management and Hierarchies Part 5: Wrapping Up
I once talked to a finance manager and asked her why her group couldn’t produce an accurate list of cost center owners. Her response was simple, “I would love to have an updated list, but no one ever tells me when there’s a change, so I have no way of maintaining a list.” As with [...]
Related posts:Vacancy Management and Hierarchies Part 3: Data/Access Ownership
Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Vacancy Management and Hierarchies Part 2: Line Management Hierarchy
Vacancy Management and Hierarchies Part 4: Cost Center Ownership
I once talked to a finance manager and asked her why her group couldn’t produce an accurate list of cost center owners. Her response was simple, “I would love to have an updated list, but no one ever tells me when there’s a change, so I have no way of maintaining a list.” As with [...]
Related posts:Vacancy Management and Hierarchies Part 3: Data/Access Ownership
Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Vacancy Management and Hierarchies Part 2: Line Management Hierarchy
Vacancy Management and Hierarchies Part 4: Cost Center Ownership
In Chapter 6 of Into the Breach (click here to listen to the audio book version of the chapter), I shared a method I use to effectively assess people, information and risk – in their own context and with a personal connection. That success led to the creation of The Catalyst Method™ — a powerful [...]
Related posts:Into the Breach – Audio Series – Chapter 7 (Putting the Strategy to Work: A Pilot)
Into the Breach – Audio Series – Chapter 8 (Measuring Success)
How can The Catalyst Method™ benefit your efforts?
1
2
3
4
5
6
Next
Total 113
Show More
The Security Catalyst
10/14/2010
Feedback
please wait...