Marco Ciappelli🎙️✨:verified: :donor:<p>🎯 FINAL POST FROM THE FLOOR: <a href="https://infosec.exchange/tags/BlackHatUSA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackHatUSA</span></a> 2025 Coverage!</p><p>Access Roulette: How to Stop Betting Your Security on Standing Privileges</p><p>This wraps up our on-location content from Las Vegas! </p><p>Next week we'll reconnect with our main event sponsors— BLACKCLOAK, Dropzone AI, Stellar Cyber, and Akamai Technologies—to bring you their post-event insights and feedback. Of course ThreatLocker's recap was already captured on the floor and published earlier today. Plus, watch for our closing reflection articles from me Marco Ciappelli and Sean Martin, CISSP!</p><p>Our final floor conversation comes thanks to our friends at Apono 🙏</p><p>Modern enterprises are gambling with security every day. Static permissions, manual approvals, and periodic audits create "privilege creep" that turns every over-privileged account into a potential breach waiting to happen. </p><p>At <a href="https://infosec.exchange/tags/BlackHat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackHat</span></a> USA 2025, Ofir Stein from <a href="https://infosec.exchange/tags/Apono" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Apono</span></a> reveals how to break this dangerous cycle.</p><p>The stakes keep rising: <br>• Non-human identities (service accounts, <a href="https://infosec.exchange/tags/APIs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APIs</span></a>, <a href="https://infosec.exchange/tags/AIagents" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIagents</span></a>) retain high-level privileges long after tasks complete <br>• Organizations discover risks during audits but lack scalable remediation <br>• <a href="https://infosec.exchange/tags/Business" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Business</span></a> teams need rapid access while security teams battle expanding <a href="https://infosec.exchange/tags/attacksurfaces" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attacksurfaces</span></a> </p><p>Apono's Zero Standing Privilege model: <br>• Removes ALL permanent access by default <br>• Grants access dynamically based on business context <br>• Automatically revokes permissions when tasks complete <br>• Works for both human AND non-human identities <br>• Integrates with existing <a href="https://infosec.exchange/tags/identity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>identity</span></a> providers—no rip and replace</p><p>Key capabilities: <br>• Context-based policy management aligned with business objectives <br>• Continuous discovery of identities, privileges<br>• Automated remediation of unnecessary privileges <br>• Real-time anomaly detection feeding <a href="https://infosec.exchange/tags/SOC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SOC</span></a> workflows <br>• Scalable across centralized and decentralized environments</p><p>The result? <br>Engineers gain control over their access (building trust), security teams maintain tight governance, and organizations can finally stop betting their security on standing privileges.</p><p>📺 Watch the video: <a href="https://youtu.be/ciBsH84PVQU" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/ciBsH84PVQU</span><span class="invisible"></span></a></p><p>🎧 Listen to the podcast: <a href="https://brand-stories-podcast.simplecast.com/episodes/access-roulette-how-to-stop-betting-your-security-on-standing-privileges-a-brand-story-with-ofir-stein-cto-and-co-founder-of-apono-a-black-hat-usa-2025-conference-on-location-brand-story-HD5Uq_kf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">brand-stories-podcast.simpleca</span><span class="invisible">st.com/episodes/access-roulette-how-to-stop-betting-your-security-on-standing-privileges-a-brand-story-with-ofir-stein-cto-and-co-founder-of-apono-a-black-hat-usa-2025-conference-on-location-brand-story-HD5Uq_kf</span></a></p><p>📖 Read the blog: <a href="https://www.itspmagazine.com/their-stories/access-roulette-how-to-stop-betting-your-security-on-standing-privileges-a-brand-story-with-ofir-stein-cto-and-co-founder-of-apono-a-black-hat-usa-2025-conference-on-location-brand-story" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">itspmagazine.com/their-stories</span><span class="invisible">/access-roulette-how-to-stop-betting-your-security-on-standing-privileges-a-brand-story-with-ofir-stein-cto-and-co-founder-of-apono-a-black-hat-usa-2025-conference-on-location-brand-story</span></a></p><p>➤ Learn more about Apono: <a href="https://itspm.ag/apono-1034" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">itspm.ag/apono-1034</span><span class="invisible"></span></a></p><p>✦ Catch more stories from Apono: <a href="https://www.itspmagazine.com/directory/apono" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">itspmagazine.com/directory/apo</span><span class="invisible">no</span></a></p><p>🎪 Follow all of our <a href="https://infosec.exchange/tags/BHUSA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BHUSA</span></a> 2025 coverage: <a href="https://www.itspmagazine.com/bhusa25" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">itspmagazine.com/bhusa25</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/IdentityManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IdentityManagement</span></a> <a href="https://infosec.exchange/tags/ZeroTrust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroTrust</span></a> <a href="https://infosec.exchange/tags/AccessControl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AccessControl</span></a> <a href="https://infosec.exchange/tags/BlackHatUSA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackHatUSA</span></a> <a href="https://infosec.exchange/tags/BHUSA25" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BHUSA25</span></a> <a href="https://infosec.exchange/tags/PrivilegeManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PrivilegeManagement</span></a> <a href="https://infosec.exchange/tags/IAM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IAM</span></a> <a href="https://infosec.exchange/tags/SecurityAutomation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityAutomation</span></a> <a href="https://infosec.exchange/tags/NonHumanIdentities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NonHumanIdentities</span></a></p>