<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>IDPro</title>
	<atom:link href="https://idpro.org/feed/" rel="self" type="application/rss+xml" />
	<link>https://idpro.org/</link>
	<description>The Professional Organization for Digital Identity Management</description>
	<lastBuildDate>Tue, 21 Apr 2026 11:13:08 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://idpro.org/wp-content/uploads/2023/07/cropped-idpro_stickerA-circle-100-32x32.jpg</url>
	<title>IDPro</title>
	<link>https://idpro.org/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Join the IDPro Board</title>
		<link>https://idpro.org/join-the-idpro-board-2026-2029/</link>
		
		<dc:creator><![CDATA[Elizabeth Garber]]></dc:creator>
		<pubDate>Tue, 21 Apr 2026 11:13:06 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[boardofdirectors]]></category>
		<category><![CDATA[professional development]]></category>
		<guid isPermaLink="false">https://idpro.org/?p=3023</guid>

					<description><![CDATA[<p>IDPro is seeking applications for a Board Member with a 2026-2029 term.</p>
<p>The post <a href="https://idpro.org/join-the-idpro-board-2026-2029/">Join the IDPro Board</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 class="wp-block-heading">Nominations Now Open for 2026-2029!</h2>



<p>Since 2017, IDPro® has been growing, evolving, and supporting the professionals working in the field of digital identity. From our founding to launching CIDPRO®—Certified Identity Professional—in 2021, we’ve worked to build a strong, connected IAM community.</p>



<p>Now, it’s time to welcome a new leader to help shape IDPro’s future. With the board size set at nine members, we have open seats for an engaged and enthusiastic professional to join us in July 2026.</p>



<h2 class="wp-block-heading">What It Means to Be on the IDPro Board</h2>



<p>This isn’t a ceremonial role—it’s hands-on. IDPro’s board is operational, which means rolling up your sleeves to keep things moving. Board members typically contribute 10–15 hours per month, participating in monthly meetings, managing projects, and engaging with members.</p>



<p>If you’re passionate about the practice and the profession of digital identity and want to actively contribute to the success of IDPro, we’d love to see you throw your hat in the ring.</p>



<p>As a board member, you will:</p>



<p><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Help steer IDPro’s strategic direction</p>



<p><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Unlock new opportunities for members through sponsors<br><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Support financial health and organizational growth<br><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Strengthen the IAM community and professional network<br><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Work alongside industry leaders and practitioners<br><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Gain leadership experience and visibility in the field</p>



<p>We value collaboration, inclusivity, and diversity—and we encourage identity professionals from all backgrounds to apply.</p>



<h2 class="wp-block-heading">Ready to Nominate?</h2>



<p>If you or someone you know would be a great fit, now’s the time to act! Self-nominations are welcome—after all, who knows your passion and skills better than you?</p>



<p><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4e9.png" alt="📩" class="wp-smiley" style="height: 1em; max-height: 1em;" /> To apply, email director@idpro.org for the nomination packet.<br><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4c5.png" alt="📅" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Deadline for completed nominations: May 15, 2026.</p>



<p>This is your chance to make a real impact in the world of digital identity. We can’t wait to see who steps forward!</p>



<p></p>



<figure class="wp-block-gallery has-nested-images columns-2 is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex"></figure>



<p></p>
<p>The post <a href="https://idpro.org/join-the-idpro-board-2026-2029/">Join the IDPro Board</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Identity Is Becoming the Operating System of the Modern Enterprise</title>
		<link>https://idpro.org/identity-is-the-operating-system-of-the-modern-enterprise/</link>
		
		<dc:creator><![CDATA[Elizabeth Garber]]></dc:creator>
		<pubDate>Tue, 31 Mar 2026 14:00:26 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[identity and access management]]></category>
		<guid isPermaLink="false">https://idpro.org/?p=2980</guid>

					<description><![CDATA[<p>Identity is becoming the operating system of the modern enterprise</p>
<p>The post <a href="https://idpro.org/identity-is-the-operating-system-of-the-modern-enterprise/">Identity Is Becoming the Operating System of the Modern Enterprise</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 class="wp-block-heading">Reference Point</h2>



<p>This article is written from one reference point only:</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>How identity <em>actually</em> behaves inside modern production systems. Not how we document it, not how tools describe it, and not how access reviews assume it works.</p>
</blockquote>



<p>When you look at identity from that lens, a quiet but fundamental shift becomes impossible to ignore.</p>



<p>Identity is no longer just a security layer.</p>



<p>It is becoming the operating system of the modern enterprise.</p>



<h2 class="wp-block-heading">The Shift No One Announced</h2>



<p>There was no roadmap presentation.</p>



<p>No architectural review.</p>



<p>No executive decision.</p>



<p>Yet over the last decade, identity has absorbed responsibilities that operating systems traditionally owned:</p>



<ul class="wp-block-list">
<li>Deciding who can execute</li>



<li>Deciding when execution is allowed</li>



<li>Brokering trust between components</li>



<li>Enforcing policy at runtime</li>



<li>Orchestrating automation</li>



<li>Gating system state changes.</li>
</ul>



<p>Today, almost every critical action in an enterprise is mediated by identity:</p>



<ul class="wp-block-list">
<li>Code reaching production</li>



<li>Infrastructure being created</li>



<li>APIs being called</li>



<li>Data being accessed</li>



<li>Privileges being delegated.</li>
</ul>



<p>Remove identity and systems don’t slow down; they stop functioning.</p>



<p>That’s the definition of an operating system.</p>



<h2 class="wp-block-heading">Identity No Longer Just Answers “Who”</h2>



<p>Classic IAM was built to answer one question</p>



<p>Who are you?</p>



<p>Modern identity systems answer a very different set of questions:</p>



<ul class="wp-block-list">
<li>Is this action allowed right now?</li>



<li>Under what conditions?</li>



<li>From which environment?</li>



<li>Triggered by which workflow?</li>



<li>With what downstream impact?</li>
</ul>



<p>Conditional access, workload identity, CI/CD pipelines, and policy engines have quietly turned identity into a decision runtime.</p>



<p>Identity now schedules work.</p>



<p>Identity now gates execution.</p>



<p>Identity now brokers trust between machines.</p>



<p>This is not an access control problem anymore.</p>



<p>It’s a control-plane problem.</p>



<h2 class="wp-block-heading">Why This Matters: OS Level Failure Modes Are Different</h2>



<p>When an application fails, it crashes.</p>



<p>When infrastructure fails, it degrades.</p>



<p>When an operating system fails, something worse happens:</p>



<p>It behaves incorrectly while still running.</p>



<p>Identity failures increasingly look like this:</p>



<ul class="wp-block-list">
<li>Nothing is “down”</li>



<li>No secrets are leaked</li>



<li>Yet authority moves in ways no one intended.</li>
</ul>



<p>A pipeline deploys more than expected.</p>



<p>A workload gains transitive trust.</p>



<p>A service identity propagates farther than designed.</p>



<p>This is not misconfiguration.</p>



<p>This is emergent behavior.</p>



<p>And emergent behavior only appears at system scale.</p>



<h2 class="wp-block-heading">Non-Human Identities: The Processes of This OS</h2>



<p>In operating systems, users don’t do the work.</p>



<p>Processes do.</p>



<p>Non-human identities are the processes of modern enterprises.</p>



<p>They include:</p>



<ul class="wp-block-list">
<li>CI/CD pipeline identities</li>



<li>Workload and service identities</li>



<li>API integrations</li>



<li>Automation frameworks</li>



<li>SaaS-to-SaaS connectors.</li>
</ul>



<p>They don’t authenticate to log in.</p>



<p>They authenticate to execute continuously.</p>



<p>And increasingly, they:</p>



<ul class="wp-block-list">
<li>Create infrastructure</li>



<li>Modify policies</li>



<li>Deploy to production</li>



<li>Move data across trust boundaries.</li>
</ul>



<p>In other words they don’t just use the system; rather, they shape it.<br></p>



<h2 class="wp-block-heading">CI/CD Pipelines: Kernel-Level Privilege, Quietly Granted</h2>



<p>If identity is becoming the operating system, CI/CD pipelines are operating with kernel-level authority.</p>



<p>A mature pipeline can:</p>



<ul class="wp-block-list">
<li>Modify source code</li>



<li>Deploy infrastructure</li>



<li>Inject secrets</li>



<li>Assume cloud roles</li>



<li>Create or modify IAM policies</li>



<li>Spin up new identities automatically</li>
</ul>



<p>And yet, pipelines are rarely modeled as privileged identities.</p>



<p>We audit developers.</p>



<p>We review pull requests.</p>



<p>But once code enters automation, trust expands dramatically.</p>



<p>The pipeline doesn’t ask should this change exist.</p>



<p>It asks is this change valid.</p>



<p>That distinction matters.</p>



<h2 class="wp-block-heading">The Uncomfortable Truth: Identity Risk Is Emergent</h2>



<p>At OS scale, risk is rarely tied to a single control failure.</p>



<p>It emerges from:</p>



<ul class="wp-block-list">
<li>How identity decisions compose</li>



<li>How trust propagates</li>



<li>how automation chains together</li>
</ul>



<p>No individual policy looks wrong.</p>



<p>No single tool is broken.</p>



<p>Yet the outcome is unsafe.</p>



<h2 class="wp-block-heading">What Professional Are Starting to Do Differently</h2>



<p>They are changing how they design.</p>



<h3 class="wp-block-heading">1. They Model Identity Flows, Not Just Permissions</h3>



<p>They ask</p>



<ul class="wp-block-list">
<li>Where does authority originate?</li>



<li>How does it propagate?</li>



<li>Where does it become irreversible?</li>
</ul>



<h3 class="wp-block-heading">2. They Treat Non-Human Identities as Platform Components</h3>



<p>Identities have</p>



<ul class="wp-block-list">
<li>Ownership</li>



<li>Versioning</li>



<li>Lifecycle expectations</li>



<li>Decommission paths</li>
</ul>



<h3 class="wp-block-heading">3. They Design for Blast Radius, Not Prevention</h3>



<p>They assume</p>



<ul class="wp-block-list">
<li>Misuse will happen</li>



<li>controls will fail</li>
</ul>



<h2 class="wp-block-heading">The Future: Identity-Native Architecture</h2>



<p>We’ll see</p>



<ul class="wp-block-list">
<li>Identity treated as runtime infrastructure</li>



<li>CI/CD pipelines as governed control planes</li>



<li>Policy evaluated as execution logic</li>



<li>Assume misuse replacing Assume breach</li>
</ul>



<p>This isn’t about zero trust.</p>



<p>It’s about system trustworthiness.</p>



<h2 class="wp-block-heading">The Paragraph That Changes the Frame</h2>



<p>We don’t run modern enterprises on operating systems alone. We run them on identity systems.</p>



<p>Identity schedules work, enforces policy, brokers trust, and gates execution. When identity fails, systems don’t go offline but they behave incorrectly at scale.</p>



<h2 class="wp-block-heading">Closing Thought</h2>



<p>Secrets management tells us how securely an identity authenticates.</p>



<p>CI/CD pipelines determine how far that identity’s authority can travel.</p>



<p>The organizations that succeed won’t be the ones with the strongest secrets, they’ll be the ones that design identity so its authority degrades gracefully instead of compounding silently.</p>



<h2 class="wp-block-heading">One-Line Takeaway</h2>



<p>Identity is no longer a security layer. It’s the operating system your business now runs on.<br><br><em>Disclaimer: The views expressed in the content are solely those of the author and do not necessarily reflect the views of the IDPro organization.</em><br><br></p>



<h2 class="wp-block-heading">Author</h2>



<figure class="wp-block-image size-large is-resized"><img fetchpriority="high" decoding="async" width="951" height="1024" src="https://idpro.org/wp-content/uploads/2026/03/image-951x1024.png" alt="" class="wp-image-2989" style="aspect-ratio:1;object-fit:cover;width:auto;height:500px" srcset="https://idpro.org/wp-content/uploads/2026/03/image-951x1024.png 951w, https://idpro.org/wp-content/uploads/2026/03/image-279x300.png 279w, https://idpro.org/wp-content/uploads/2026/03/image-768x827.png 768w, https://idpro.org/wp-content/uploads/2026/03/image.png 1170w" sizes="(max-width: 951px) 100vw, 951px" /></figure>



<p><br><a href="https://www.linkedin.com/in/voramalhar/">Malhar Vora</a> is a Principal Security Engineer and Engineering &amp; People Leader at ANZ Bank with nearly two decades of experience in identity and privileged access security within highly regulated financial environments.</p>



<p>He leads the solution and engineering delivery of enterprise-scale PAM platforms across on-premises and multi-cloud ecosystems, with a focus on systemic risk reduction and resilient identity controls.</p>



<p>Malhar mentors security engineers and collaborates closely with enterprise architecture, cloud, and risk teams to advance modern identity engineering practices.</p>



<p>He is a CyberArk MVP, frequent industry speaker, and active contributor sharing practical insights on identity-centric security and privilege risk management.</p>



<p></p>



<figure class="wp-block-gallery has-nested-images columns-2 is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex">
<figure class="wp-block-image size-large"><img decoding="async" width="346" height="350" data-id="2898" src="https://idpro.org/wp-content/uploads/2025/11/image-2.png" alt="" class="wp-image-2898" srcset="https://idpro.org/wp-content/uploads/2025/11/image-2.png 346w, https://idpro.org/wp-content/uploads/2025/11/image-2-297x300.png 297w" sizes="(max-width: 346px) 100vw, 346px" /></figure>



<figure class="wp-block-image size-full"><img decoding="async" width="600" height="600" data-id="2390" src="https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author.png" alt="" class="wp-image-2390" srcset="https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author.png 600w, https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author-300x300.png 300w, https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author-150x150.png 150w, https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author-320x320.png 320w" sizes="(max-width: 600px) 100vw, 600px" /></figure>
</figure>



<p></p>
<p>The post <a href="https://idpro.org/identity-is-the-operating-system-of-the-modern-enterprise/">Identity Is Becoming the Operating System of the Modern Enterprise</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Threat of Recovery</title>
		<link>https://idpro.org/the-threat-of-recovery/</link>
		
		<dc:creator><![CDATA[Elizabeth Garber]]></dc:creator>
		<pubDate>Thu, 26 Feb 2026 18:50:48 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[non-human identity]]></category>
		<guid isPermaLink="false">https://idpro.org/?p=2968</guid>

					<description><![CDATA[<p>Users make mistakes. It behooves us as stewards of a user’s data to ensure compromise does not occur, but at the same time ensure that if the user does what humans do and makes a mistake that they are able to recover gracefully.</p>
<p>The post <a href="https://idpro.org/the-threat-of-recovery/">The Threat of Recovery</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Users make mistakes.&nbsp; They&#8217;ll forget the credentials they used to register for a service, the email or username they may have used, or even the name of the actual service they registered for in the first place.&nbsp; They&#8217;ll use other people&#8217;s emails thinking they own them, lock themselves out putting in the same exact password that failed repeatedly, and outsmart themselves by using bad information (such as a fake birthday) during registration and then promptly forget it.&nbsp;&nbsp;</p>



<p>Users also make well-intentioned decisions.&nbsp; They might need to log into a service from a place thousands of miles away from where they normally do in order to change plans.&nbsp; They might try to perform what would otherwise be a valid operation during a time that they simply have never been logged on over years of steady use.&nbsp; They might need to force an old device, now in the hands of an abuser, to be logged out of the service – and do so rapidly.&nbsp;&nbsp;</p>



<p>Users entrust us with their data.&nbsp; For a given CIAM service, compromise of an account created by a user may disclose PII, allow for adverse financial transactions to occur on behalf of the user, use the service in a manner that the user may find objectionable or otherwise is against terms of service, and so on.&nbsp; It behooves us as stewards of a user’s data to ensure compromise does not occur, but at the same time ensure that if the user does what humans do and makes a mistake that they are able to recover gracefully.</p>



<p><br>With all of that in mind, there comes a point where the actions of a well-intentioned but clumsy user may look not unlike a threat actor who has compromised a user&#8217;s account.&nbsp; It becomes extremely difficult to determine the reality of the situation without having significant context.&nbsp; A prudently designed system might restrict or otherwise lock users who demonstrate suspicious activity – likewise, a user who suspects their account may be compromised (because they can&#8217;t log in suddenly, for instance) may wish to take some actions to prove the account is theirs and kick out anyone else who may be using the account.</p>



<p>A well-designed service should offer a set of mechanisms by which a user may attempt to regain logical access.&nbsp; Today, these account recovery flows are often highly automated, requiring specific information or actions from the user and minimal intervention from support staff for the service.&nbsp; This becomes a blessing and a curse, as a savvy attacker may be able to lock out a user and then leverage the account to perform nefarious deeds.</p>



<p>We are then faced with a monstrous task.&nbsp; How then should we model account recovery so that it rebuffs attackers?&nbsp; It turns out that recently some interesting answers were shared on this very topic.&nbsp; During the summer of 2025, Sid Rao and Gabriela Sonkeri gave a talk at Black Hat titled <em>Lost &amp; Found: The Hidden Risks of Account Recovery in a Passwordless Future</em> that offers an auditing framework for account recovery called the ARTHA framework.</p>



<p>The repository that contains the ARTHA framework can be found at https://github.com/Nokia-Bell-Labs/Account-Recovery-Threat-Heuristic-Auditing-Framework .&nbsp; The auditing process is across 9 separate test cases, which test the following:</p>



<ul class="wp-block-list">
<li>Account creation</li>



<li>Account state specific tests (how can we recover from different paths in an account recovery flow?)</li>



<li>How recovery works with multiple recovery methods in play</li>



<li>Session termination</li>



<li>The usage of MFA in the flow</li>



<li>Interchangeability of authentication factors / recovery channels</li>
</ul>



<p>On top of the framework, the slides from the presentation (<a href="https://i.blackhat.com/BH-USA-25/Presentations/US-25-Rao-Lost-and-Found-The-Hidden-Risks-Of-Account-Recovery-In-a-Passwordless-Future.pdf">https://i.blackhat.com/BH-USA-25/Presentations/US-25-Rao-Lost-and-Found-The-Hidden-Risks-Of-Account-Recovery-In-a-Passwordless-Future.pdf</a>) are also rich with content and should be given a read over.&nbsp; For instance, from the session termination perspective a major design flaw is that sessions are allowed to remain in-place after an account recovery action has been performed.&nbsp; The slides give a fantastic diagram for this, as we can see below.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="419" src="https://idpro.org/wp-content/uploads/2026/02/image-1024x419.png" alt="" class="wp-image-2972" srcset="https://idpro.org/wp-content/uploads/2026/02/image-1024x419.png 1024w, https://idpro.org/wp-content/uploads/2026/02/image-300x123.png 300w, https://idpro.org/wp-content/uploads/2026/02/image-768x314.png 768w, https://idpro.org/wp-content/uploads/2026/02/image.png 1186w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>The team also gives a solid list of best practices that should be considered.&nbsp; The team goes into far more detail through the slide deck (which, again, is fantastic) but their slide on the ideal recovery flow is particularly salient here.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="492" src="https://idpro.org/wp-content/uploads/2026/02/image-1-1024x492.png" alt="" class="wp-image-2973" srcset="https://idpro.org/wp-content/uploads/2026/02/image-1-1024x492.png 1024w, https://idpro.org/wp-content/uploads/2026/02/image-1-300x144.png 300w, https://idpro.org/wp-content/uploads/2026/02/image-1-768x369.png 768w, https://idpro.org/wp-content/uploads/2026/02/image-1.png 1181w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>Given the increasingly automated and human-detached processes that make up account recovery, we as practitioners need to understand the choices we are making as part of that process to extract the enterprise from assisting directly with account recovery.&nbsp; This means we need to build trust from the start, communicate meaningfully with the user about account state, and ensure that recovery actions are meaningful through session termination and communication back to the user.</p>



<p><em>Disclaimer: The views expressed in the content are solely those of the author and do not necessarily reflect the views of the IDPro organization.</em></p>



<h2 class="wp-block-heading"><br>Author</h2>



<p><img loading="lazy" decoding="async" width="150" height="150" src="blob:https://idpro.org/6f9d29c0-14f1-4e25-897d-037990d0a125"> </p>



<p><a href="https://www.linkedin.com/in/rusty-%F0%9F%94%8F-unicode-breaks-things-deaton-a3584483/">Rusty Deaton</a> has been in Identity and Access Management for over a decade. He began in technology as a technical support engineer for a Broker-Dealer and has since worked across many industries, carrying forward a passion for doing right by people. When not solving problems, he loves to tinker with electronics and read. He currently works as Federal Principal Architect for Radiant Logic.ghts on identity security through his blog at <a href="https://iam.ninja/">iam.ninja</a> and engages with the IAM community on LinkedIn. When he&#8217;s not deep in security design, you&#8217;ll find him playing pickleball, writing about personal finance, stargazing, or playing tabletop board games.</p>



<figure class="wp-block-gallery has-nested-images columns-5 is-cropped wp-block-gallery-3 is-layout-flex wp-block-gallery-is-layout-flex">
<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="346" height="350" data-id="2898" src="https://idpro.org/wp-content/uploads/2025/11/image-2.png" alt="" class="wp-image-2898" srcset="https://idpro.org/wp-content/uploads/2025/11/image-2.png 346w, https://idpro.org/wp-content/uploads/2025/11/image-2-297x300.png 297w" sizes="auto, (max-width: 346px) 100vw, 346px" /></figure>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="600" height="600" data-id="2390" src="https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author.png" alt="" class="wp-image-2390" srcset="https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author.png 600w, https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author-300x300.png 300w, https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author-150x150.png 150w, https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author-320x320.png 320w" sizes="auto, (max-width: 600px) 100vw, 600px" /></figure>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="600" height="600" data-id="1270" src="https://idpro.org/wp-content/uploads/2021/08/IDPro_BoK_Badges_R5__Published_BoK_Author.png" alt="" class="wp-image-1270" srcset="https://idpro.org/wp-content/uploads/2021/08/IDPro_BoK_Badges_R5__Published_BoK_Author.png 600w, https://idpro.org/wp-content/uploads/2021/08/IDPro_BoK_Badges_R5__Published_BoK_Author-300x300.png 300w, https://idpro.org/wp-content/uploads/2021/08/IDPro_BoK_Badges_R5__Published_BoK_Author-150x150.png 150w, https://idpro.org/wp-content/uploads/2021/08/IDPro_BoK_Badges_R5__Published_BoK_Author-320x320.png 320w" sizes="auto, (max-width: 600px) 100vw, 600px" /></figure>
</figure>



<p></p>
<p>The post <a href="https://idpro.org/the-threat-of-recovery/">The Threat of Recovery</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 
Lazy Loading (feed)
Minified using Disk

Served from: idpro.org @ 2026-04-24 16:23:46 by W3 Total Cache
-->