{"id":25239,"date":"2025-07-15T00:53:39","date_gmt":"2025-07-15T00:53:39","guid":{"rendered":"https:\/\/www.insentragroup.com\/au\/?p=25239"},"modified":"2025-07-17T02:12:27","modified_gmt":"2025-07-17T02:12:27","slug":"mind-the-microsoft-gap-digital-identity-zero-trust-security","status":"publish","type":"post","link":"https:\/\/www.insentragroup.com\/au\/insights\/resources\/podcast\/mind-the-microsoft-gap\/mind-the-microsoft-gap-digital-identity-zero-trust-security\/","title":{"rendered":"Mind the Microsoft Gap: Digital Identity &amp; Zero Trust Security"},"content":{"rendered":"\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"Mind the Microsoft Gap: Digital Identity &amp; Zero Trust Security\" width=\"750\" height=\"422\" src=\"https:\/\/www.youtube.com\/embed\/0Jf31h2i9Hg?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>In this episode of <em>Mind the Microsoft Gap<\/em>, hosts <strong>Chris Threlfall<\/strong> and <strong>Nick Thomas<\/strong> unpack the modern meaning of <strong>digital identity<\/strong> and why it&#8217;s become a cornerstone of cloud security. Whether you&#8217;re working from the office, home, or a coffee shop in Amsterdam, your identity is constantly evolving and protecting it is more critical than ever.<\/p>\n\n\n\n<p>From login credentials to behavioral patterns, your digital identity is a constantly evolving collection of data. Chris and Nick break down how businesses can protect that identity in a world where remote work is the norm, threats are more sophisticated and <strong>Zero Trust security<\/strong> is no longer optional.&nbsp;<\/p>\n\n\n\n<p><strong>What You\u2019ll Learn:<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>What makes up your digital identity (spoiler: it\u2019s more than a password)<\/li>\n\n\n\n<li>How <strong>Microsoft Entra ID<\/strong>, <strong>PIM<\/strong>, and <strong>Conditional Access<\/strong> help manage secure access<\/li>\n\n\n\n<li>Why <strong>Zero Trust<\/strong> is reshaping how we protect users and systems<\/li>\n\n\n\n<li>The importance of <strong>MFA, SSO, and role-based access<\/strong><\/li>\n\n\n\n<li>Why <strong>end-user education<\/strong> is your strongest security defense&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>With relatable stories, expert insights, and practical tips, this episode is perfect for IT professionals, tech leads, and anyone interested in <strong>cybersecurity<\/strong>, <strong>identity management<\/strong> and <strong>Microsoft 365 best practices<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Timestamp<\/strong>&nbsp;<\/td><td><strong>Topic<\/strong>&nbsp;<\/td><\/tr><tr><td><strong>0:18<\/strong>&nbsp;<\/td><td><strong>Episode Theme Introduced<\/strong> \u2013 Focus on digital identity in the modern world.&nbsp;<\/td><\/tr><tr><td><strong>1:21<\/strong>&nbsp;<\/td><td><strong>What is Digital Identity?<\/strong> \u2013 Discussion about what makes up your online identity.&nbsp;<\/td><\/tr><tr><td><strong>4:10<\/strong>&nbsp;<\/td><td><strong>Proving Who You Are Online<\/strong> \u2013 Challenges and tools for identity verification.&nbsp;<\/td><\/tr><tr><td><strong>6:59<\/strong>&nbsp;<\/td><td><strong>Remote Work &amp; New Security Needs<\/strong> \u2013 Why location and context matter more now.&nbsp;<\/td><\/tr><tr><td><strong>8:22<\/strong>&nbsp;<\/td><td><strong>Introduction to Zero Trust<\/strong> \u2013 A shift in how we approach digital security.&nbsp;<\/td><\/tr><tr><td><strong>11:19<\/strong>&nbsp;<\/td><td><strong>Managing Admin Access Securely<\/strong> \u2013 How Microsoft tools help control elevated access.&nbsp;<\/td><\/tr><tr><td><strong>13:10<\/strong>&nbsp;<\/td><td><strong>What Holds Companies Back?<\/strong> \u2013 Common barriers to implementing better identity practices.&nbsp;<\/td><\/tr><tr><td><strong>17:31<\/strong>&nbsp;<\/td><td><strong>Modern Approaches to MFA<\/strong> \u2013 Beyond passwords and text messages.&nbsp;<\/td><\/tr><tr><td><strong>19:45<\/strong>&nbsp;<\/td><td><strong>Using Physical Security Keys<\/strong> \u2013 How hardware improves login security.&nbsp;<\/td><\/tr><tr><td><strong>22:54<\/strong>&nbsp;<\/td><td><strong>Single Sign-On (SSO)<\/strong> \u2013 Simplifying and securing user access across systems.&nbsp;<\/td><\/tr><tr><td><strong>24:43<\/strong>&nbsp;<\/td><td><strong>Users as the Biggest Risk<\/strong> \u2013 Why training and awareness are critical.&nbsp;<\/td><\/tr><tr><td><strong>29:48<\/strong>&nbsp;<\/td><td><strong>Final Wrap-Up &amp; Key Takeaways<\/strong> \u2013 Recap of digital identity and best practices.&nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Need help strengthening your identity strategy?<\/h2>\n\n\n\n<p><strong><a href=\"https:\/\/www.insentragroup.com\/au\/contact\/\" target=\"_blank\" rel=\"noreferrer noopener\">Contact us<\/a><\/strong><span style=\"box-sizing: border-box; margin: 0px; padding: 0px;\"><strong>&nbsp;<\/strong><\/span>to discuss how we can support your Zero Trust journey and Microsoft 365 environment.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this episode of Mind the Microsoft Gap, hosts Chris Threlfall and Nick Thomas unpack the modern meaning of digital identity and why it&#8217;s become a cornerstone of cloud security. Whether you&#8217;re working from the office, home, or a coffee shop in Amsterdam, your identity is constantly evolving and protecting it is more critical than&hellip; <a class=\"more-link\" href=\"https:\/\/www.insentragroup.com\/au\/insights\/resources\/podcast\/mind-the-microsoft-gap\/mind-the-microsoft-gap-digital-identity-zero-trust-security\/\">Continue reading <span class=\"screen-reader-text\">Mind the Microsoft Gap: Digital Identity &amp; Zero Trust Security<\/span><\/a><\/p>\n","protected":false},"author":182,"featured_media":25242,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[295],"tags":[],"class_list":["post-25239","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mind-the-microsoft-gap","entry"],"_links":{"self":[{"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/posts\/25239","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/users\/182"}],"replies":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/comments?post=25239"}],"version-history":[{"count":3,"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/posts\/25239\/revisions"}],"predecessor-version":[{"id":25262,"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/posts\/25239\/revisions\/25262"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/media\/25242"}],"wp:attachment":[{"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/media?parent=25239"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/categories?post=25239"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/tags?post=25239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}