MIT Sloan AI Adoption: Build a Playbook That Drives Real Business ROI
Python, Prompt Engineering, Data Science — Build the Skills Employers Want Now
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore how identity has become the critical foundation for modern observability practices in this 23-minute conference talk from Conf42 O11y 2025. Learn why traditional observability tools create dangerous blind spots when they fail to incorporate identity-centric monitoring, and discover how access management has evolved into the primary attack vector for security breaches. Examine real-world examples of identity-related security incidents and understand the visibility gap that exists between identity management and observability systems. Master a framework for assessing identity visibility and risk awareness through four key quadrants, while identifying common implementation challenges organizations face when deploying identity-focused monitoring tools. Gain practical insights into best practices for integrating identity considerations into your observability strategy, including effective access review processes and techniques for eliminating blind spots in your security monitoring. Understand why "access is the new breach" and how to build comprehensive observability that starts with identity as the new security perimeter.
Syllabus
00:00 Introduction to Observability and Identity
00:32 The Importance of Access Reviews
01:05 Blind Spots in Observability Tools
02:47 Identity as the New Perimeter
03:56 Common Identity-Related Breaches
06:01 The Visibility Gap in Identity and Observability
07:00 Quadrants of Identity Visibility and Risk Awareness
14:58 Challenges in Implementing Identity Tools
17:05 Best Practices for Identity and Observability
21:31 Conclusion and Final Thoughts
Taught by
Conf42